X Zhao, G Wang, Z Li - 2016 Sixth International Conference on …, 2016 - ieeexplore.ieee.org
Most traditional network anomalies and attacks detection systems tend to employ supervised
strategies, which require labeled training dataset that is arduous and expensive to obtain …