background image

89 

 

[29]  “sklearn.preprocessing.StandardScaler — scikit-learn 1.1.1 documentation.” 

https://scikit-
learn.org/stable/modules/generated/sklearn.preprocessing.StandardScaler.html 

[30]  “sklearn.model_selection.train_test_split — scikit-learn 1.1.1 documentation.” 

https://scikit-
learn.org/stable/modules/generated/sklearn.model_selection.train_test_split.html 

[31]  “Understanding a Classification Report For Your Machine Learning Model | by Shivam 

Kohli | Medium.” https://medium.com/@kohlishivam5522/understanding-a-
classification-report-for-your-machine-learning-model-88815e2ce397 

[32]  “Compute Classification Report and Confusion Matrix in Python - GeeksforGeeks.” 

https://www.geeksforgeeks.org/compute-classification-report-and-confusion-matrix-
in-python/ 

[33]  “sklearn.metrics.precision_recall_fscore_support — scikit-learn 1.1.1 documentation.” 

https://scikit-
learn.org/stable/modules/generated/sklearn.metrics.precision_recall_fscore_support.
html#sklearn.metrics.precision_recall_fscore_support 

[34]  “3.3. Metrics and scoring: quantifying the quality of predictions — scikit-learn 1.1.1 

documentation.” https://scikit-
learn.org/stable/modules/model_evaluation.html#accuracy-score 

[35]  S. Naseer et al., “Enhanced network anomaly detection based on deep neural 

networks,” IEEE Access, vol. 6, pp. 48231–48246, Aug. 2018, doi: 
10.1109/ACCESS.2018.2863036. 

[36]  T. Su, H. Sun, J. Zhu, S. Wang, and Y. Li, “BAT: Deep Learning Methods on Network 

Intrusion Detection Using NSL-KDD Dataset,” IEEE Access, vol. 8, pp. 29575–29585, 
2020, doi: 10.1109/ACCESS.2020.2972627.