1. Rami J. Alzahrani and Ahmed Alzahrani . 2021 . Security Analysis of DDoS Attacks Using Machine Learning Algorithms in Networks Traffic. Electronics 10, 23 (2021). https://doi.org/10.3390/electronics10232919 10.3390/electronics10232919 Rami J. Alzahrani and Ahmed Alzahrani. 2021. Security Analysis of DDoS Attacks Using Machine Learning Algorithms in Networks Traffic. Electronics 10, 23 (2021). https://doi.org/10.3390/electronics10232919
2. Gérard Biau. 2010. Analysis of a Random Forests Model. https://doi.org/10.48550/ARXIV.1005.0208 10.48550/ARXIV.1005.0208
3. Gérard Biau. 2010. Analysis of a Random Forests Model. https://doi.org/10.48550/ARXIV.1005.0208
4. Tianqi Chen and Carlos Guestrin . 2016 . XGBoost. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM , San Francisco, –. https://doi.org/10.1145/2939672.2939785 10.1145/2939672.2939785 Tianqi Chen and Carlos Guestrin. 2016. XGBoost. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, San Francisco, –. https://doi.org/10.1145/2939672.2939785
5. Dylan Chou and Meng Jiang. 2020. Data-Driven Network Intrusion Detection: A Taxonomy of Challenges and Methods. CoRR abs/2009.07352(2020) –. arXiv:2009.07352https://arxiv.org/abs/2009.07352 Dylan Chou and Meng Jiang. 2020. Data-Driven Network Intrusion Detection: A Taxonomy of Challenges and Methods. CoRR abs/2009.07352(2020) –. arXiv:2009.07352https://arxiv.org/abs/2009.07352