Research Article

Improving the Accuracy of Network Intrusion Detection with Causal Machine Learning

Figure 11

Learning curves comparing the accuracy with the number of training samples required for the four methods (single cyberattack). (a) Z-score. (b) SMOTE. (c) CFS. (d) CRFS.
(a)
(b)
(c)
(d)