Research Article

Improving the Accuracy of Network Intrusion Detection with Causal Machine Learning

Figure 2

The relationship between cyberattacks and extracted features. (a) XV. (b) X ⟶ V.
(a)
(b)