Research Article
Improving the Accuracy of Network Intrusion Detection with Causal Machine Learning
Figure 11
Learning curves comparing the accuracy with the number of training samples required for the four methods (single cyberattack). (a) Z-score. (b) SMOTE. (c) CFS. (d) CRFS.
(a) |
(b) |
(c) |
(d) |