Keyphrases
Feature Extraction
100%
Big Data
100%
Machine Learning Based
100%
Intrusion Detection System
100%
Imbalanced Data
100%
Network Intrusion Detection
100%
Feature Embedding
100%
Embedding Extraction
100%
RF Model
60%
Dimensionality Reduction
40%
ETS Model
40%
Principal Coordinate Analysis (PCoA)
20%
Number of Data
20%
Address Data
20%
Cybersecurity
20%
Machine Learning Models
20%
Model Performance
20%
Benchmark Dataset
20%
Accuracy Rate
20%
Network Traffic
20%
Malicious Behavior
20%
Global Concern
20%
Interconnected Networks
20%
Performance Results
20%
Novel Machine
20%
Behavior Analysis
20%
Cyber Threats
20%
UNSW-NB15
20%
Training Machine
20%
Random Undersampling
20%
UNSW-NB15 Dataset
20%
CICIDS2017
20%
CSE-CIC-IDS2018
20%
Data Stacking
20%
Malicious Actors
20%
Clustering Results
20%
Dataset Model
20%
Computer Science
Intrusion Detection System
100%
Imbalanced Data
100%
Big Data
100%
network intrusion detection
100%
Machine Learning
100%
Learning System
100%
Feature Extraction
100%
Cybersecurity
25%
Network Traffic
25%
Clustering Result
25%
Malicious Activity
25%
Interconnected Network
25%
Performance Model
25%
Malicious Actor
25%
Component Analysis
25%
Principal Components
25%
Behavior Analysis
25%