Text this: Evaluating Tabular Representation Learning for Network Intrusion Detection