Z Zeng, W Peng, B Zhao - Security and Communication …, 2021 - Wiley Online Library
In recent years, machine learning (ML) algorithms have been approved effective in the
intrusion detection. However, as the ML algorithms are mainly applied to evaluate the …