Y Yao, Z Wang, C Gan, Q Kang, X Liu,
Y Xia, L Zhang - Neurocomputing, 2016 - Elsevier
To secure the network system, a large number of different information security devices, eg,
intrusion detection system, firewall, etc., have been deployed in the network. These devices …