Research Article
Network Intrusion Anomaly Detection Model Based on Multiclassifier Fusion Technology
| Input: the results set predicted by each base classifiers Y; | | Output: final prediction result C; | (1) | a [2] ← {0, 0}; | (2) | for y in Y do | (3) | a [y] ← a [y] + 1; | (4) | end for | (5) | C ← argmax (a) | (6) | return C |
|