Research Article
Research on the Intrusion Detection Model of Underwater Sensor Networks
| Abbreviation | Full name |
| UWSNs | Underwater wireless sensor networks | DoS | Denial of service | Probe | Surveillance and probing | U2R | User to root | R2L | Remote to local | KDDcup99 | Data Mining and Knowledge Discovery | SVM | Support vector machine | ML | Machine learning | MITM | Man-in-the-middle | SMOTE | Synthetic minority oversampling technique | CH | Cluster head | CM | Cluster member | BS | Base station | CART | Classification and regression tree | ACC | Accuracy | | Precision | TPR | True positive rate | FPR | False positive rate | TP | True positive | FP | False positive | TN | True negative | FN | False negative | ELM | Extreme learning machines | tcp | Transmission Control Protocol | udp | User Datagram Protocol | icmp | Internet Control Message Protocol |
|
|