Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Fig 1.

The flow of the FIERL model.

More »

Fig 1 Expand

Table 1.

Details of the experimental data.

More »

Table 1 Expand

Table 2.

Experimental results of detecting APT attack when the FIE model’s parameters are changed and parameters τ and α of RL model are fixed at 0.1 and 0.1 respectively.

More »

Table 2 Expand

Table 3.

Experimental results of detecting APT attack when the RL model’s parameters are changed and the FIE model’s parameters are fixed.

More »

Table 3 Expand

Fig 2.

Confusion matrix result of the FIERL model with the best parameters.

More »

Fig 2 Expand

Table 4.

Experimental results when replacing the FIE model with some deep learning networks.

More »

Table 4 Expand

Fig 3.

Confusion matrix results of models using deep learning networks to replace the FIE model.

In which (a): CNN; (b): LSTM; (c): MLP-Inference.

More »

Fig 3 Expand

Table 5.

Experimental results when replacing components in the RL model.

More »

Table 5 Expand

Fig 4.

Comparing the difference in data distribution of the Smote and Dropout methods.

Where: (a): The data distribution of the Smote algorithm; (b): The data distribution of the Dropout algorithm.

More »

Fig 4 Expand

Fig 5.

(a): The data distribution when using a combination of Dropout and Triplet Loss; (b): The data distribution when using a combination of Dropout and Contrastive Learning.

More »

Fig 5 Expand

Fig 6.

Comparing the data distribution of the method without using representation learning (a) and using representation learning (b).

More »

Fig 6 Expand

Table 6.

Experimental results of scenario 3.

More »

Table 6 Expand