MA Khan, Y Kim - Computers, Materials & Continua, 2021 - search.ebscohost.com
Abstract Machine learning (ML) algorithms are often used to design effective intrusion
detection (ID) systems for appropriate mitigation and effective detection of malicious cyber …