V Bulavas - 2018 59th International Scientific Conference on …, 2018 - ieeexplore.ieee.org
There are numerous sources of network intrusion detection data, for example, network traffic,
system host logs, user activity, such as mail or browsing, use of smart devices and similar …