no code implementations • 10 Nov 2016 • Heju Jiang, Jasvir Nagra, Parvez Ahammad
In this paper, we systematically study the methods, algorithms, and system designs in academic publications from 2008-2015 that applied ML in security domains.
BIG-bench Machine Learning Intrusion Detection +2