89
[29] “sklearn.preprocessing.StandardScaler — scikit-learn 1.1.1 documentation.”
https://scikit-
learn.org/stable/modules/generated/sklearn.preprocessing.StandardScaler.html
[30] “sklearn.model_selection.train_test_split — scikit-learn 1.1.1 documentation.”
https://scikit-
learn.org/stable/modules/generated/sklearn.model_selection.train_test_split.html
[31] “Understanding a Classification Report For Your Machine Learning Model | by Shivam
Kohli | Medium.” https://medium.com/@kohlishivam5522/understanding-a-
classification-report-for-your-machine-learning-model-88815e2ce397
[32] “Compute Classification Report and Confusion Matrix in Python - GeeksforGeeks.”
https://www.geeksforgeeks.org/compute-classification-report-and-confusion-matrix-
in-python/
[33] “sklearn.metrics.precision_recall_fscore_support — scikit-learn 1.1.1 documentation.”
https://scikit-
learn.org/stable/modules/generated/sklearn.metrics.precision_recall_fscore_support.
html#sklearn.metrics.precision_recall_fscore_support
[34] “3.3. Metrics and scoring: quantifying the quality of predictions — scikit-learn 1.1.1
documentation.” https://scikit-
learn.org/stable/modules/model_evaluation.html#accuracy-score
[35] S. Naseer et al., “Enhanced network anomaly detection based on deep neural
networks,” IEEE Access, vol. 6, pp. 48231–48246, Aug. 2018, doi:
10.1109/ACCESS.2018.2863036.
[36] T. Su, H. Sun, J. Zhu, S. Wang, and Y. Li, “BAT: Deep Learning Methods on Network
Intrusion Detection Using NSL-KDD Dataset,” IEEE Access, vol. 8, pp. 29575–29585,
2020, doi: 10.1109/ACCESS.2020.2972627.