Fig. 4From: Intrusion detection system combined enhanced random forest with SMOTE algorithmAttack-type similarity matrixBack to article page