1. Baddar SWA-H, Merlo A, Migliardi M (2014) Anomaly detection in computer networks: a state-of-the-art review. J Wirel Mob Netw Ubiquitous Comput Dependable Appl 5(4):29–64
2. Bharadiya JP (2023) A review of Bayesian machine learning principles, methods, and applications. Int J Innov Sci Res Technol 8(5):2033–2038
3. Bischl B et al (2023) Hyperparameter optimization: Foundations, algorithms, best practices, and open challenges. Wiley Interdisc Rev Data Min Knowl Disc 13(2):e1484
4. Farhangi S, Rostami A, Golmohammadi S (2012) Performance comparison of mixed protocols based on EIGRP, IS-IS and OSPF for real-time applications. Middle-East J Sci Res 12(11):1502–1508
5. Firdausi I, Erwin A, Nugroho AS (2010) Analysis of machine learning techniques used in behavior-based malware detection. In: 2010 second international conference on advances in computing, control, and telecommunication technologies. IEEE, pp 201–203