Comparative Analysis of Perturbation Techniques in LIME for Intrusion Detection Enhancement
The growing sophistication of cyber threats necessitates robust and interpretable intrusion detection systems (IDS) to safeguard network security.While machine learning models such as Decision AEG BSE792320M SteamPro Sous Vide Oven With ProSight Touch Controls Tree (DT), Random Forest (RF), k-Nearest Neighbors (K-NN), and XGBoost demonstrate high e