Fig. 2From: Intrusion detection system combined enhanced random forest with SMOTE algorithmSampling processingBack to article page