Jay

Results 1 repositories owned by Jay

Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.