Research Article
Improving the Accuracy of Network Intrusion Detection with Causal Machine Learning
Figure 12
The accuracy and the number of training samples required for the four methods (there are multiple types of cyberattacks). (a) Z-score. (b) SMOTE. (c) CFS. (d) CRFS.
(a) |
(b) |
(c) |
(d) |