Search in PRIMO
Autoren: Spandana, Kovada Subhakar, Kotamsetti Viswa Sirisha, Udandarao et al.
Quelle: EPJ Web of Conferences; 11/20/2025, Vol. 341, p1-11, 11p
Schlagwörter: ANOMALY detection (Computer security), EDGE computing, TRANSFORMER models, INTRUSION detection systems (Computer security), CAUSAL models, MATHEMATICAL optimization