Abstract
The detection of malicious activities in networks has evolved over time, enhancing cybersecurity and making traffic monitoring more efficient. However, this task still faces significant challenges, particularly due to the computational limitations of edge devices, which hinder the application of traditional machine learning models. Given this scenario, the development of optimized solutio…