Research Article

Smart Congestion Control in 5G/6G Networks Using Hybrid Deep Learning Techniques

Table 7

Fusion results of the proposed cyber-attack detection model.

S. NO.Naïve BayesSVMThe proposed cyber-attack detection modelThe human expert decision of the cyber-attack detection modelProbability of correctnessProbability of errors

119.1 (no)24.1 (no)17.4 (no)No10
23.5 (no)71.1 (yes)22.6 (no)No10
327.1 (no)24.1 (no)22.6 (no)No10
427.1 (no)24.1 (no)22.6 (no)No10
527.1 (no)24.1 (no)22.6 (no)No10
627.1 (no)24.1 (no)22.6 (no)No10
776.1 (yes)71.1 (yes)72.5 (yes)Yes10
878.1 (yes)71.1 (yes)72.5 (yes)Yes10
928.1 (no)71.1 (yes)22.6 (no)No10
1090.5 (yes)71.1 (yes)72.5 (yes)Yes10
1176.1 (yes)71.1 (yes)72.5 (yes)Yes10
1291.3 (yes)71.1 (yes)22.6 (yes)Yes10
1319.1 (no)24.1 (no)17.4 (no)No10
1427.1 (no)24.1 (no)22.6 (no)No10
1519.1 (no)24.1 (no)22.6 (no)Yes01