Abstract:
he exponential development of digital technology exposes systems to
increasingly high security risks, making intrusion detection a major issue in this
context. In this study, the authors present a two-step approach. First, three
attribute evaluators are used to reduce the dimensionality of the dataset and
select the relevant attributes