Z Yang, X Liu,
T Li,
D Wu, J Wang, Y Zhao, H Han - Computers & Security, 2022 - Elsevier
… First, we analyze research progress and identify potential … Second, we study preprocessing
techniques, such as data … Third, we discuss intrusion detection techniques and analyze their …