Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Fig 1.

A flowchart of the data preprocessing pipeline.

More »

Fig 1 Expand

Fig 2.

A flowchart of the model training pipeline.

More »

Fig 2 Expand

Fig 3.

The proposed architecture.

More »

Fig 3 Expand

Table 1.

System specifications and setup used in the study.

More »

Table 1 Expand

Fig 4.

Samples of nodes in the training, validation and test sets of the graphs.

More »

Fig 4 Expand

Fig 5.

The change in performance for both training and validation sets as training progresses.

More »

Fig 5 Expand

Fig 6.

Node embeddings from the proposed model on the test set.

More »

Fig 6 Expand

Table 2.

Comparing GConvTrans and recent state-of-the-art intrusion detection models.

More »

Table 2 Expand