Comparative analysis of CN2 rule induction with other classification algorithms for network security.
Neeraj KumarUpendra KumarPublished in: Multim. Tools Appl. (2022)
Keyphrases
- rule induction
- comparative analysis
- network security
- decision rules
- decision trees
- instance based learning
- classification rules
- rough sets
- classification algorithm
- rule sets
- intrusion detection system
- intrusion detection
- rough set theory
- data mining
- feature extraction
- support vector
- traffic analysis
- network traffic
- knowledge discovery in databases
- pattern recognition
- decision tree algorithm
- computer networks
- classification accuracy
- learning algorithm
- semi quantitative
- class labels
- unsupervised learning
- semi supervised
- machine learning