Table 5 Comparative analysis of ABOADL-IDS approach with existing models11.
From: African buffalo optimization with deep learning-based intrusion detection in cyber-physical systems
Models | \(Accu_{y}\) | \(Prec_{n}\) | \(Reca_{l}\) | \(F_{{score}}\) |
|---|---|---|---|---|
ABOADL IDS | 99.28 | 99.25 | 99.28 | 99.27 |
XAIIDS-CPS | 98.87 | 98.95 | 98.87 | 98.91 |
FU-RIA | 98.14 | 97.57 | 96.93 | 98.26 |
AERF | 97.62 | 97.35 | 97.79 | 97.30 |
ForestPA | 96.72 | 96.97 | 97.32 | 98.13 |
WI-SARD | 96.64 | 97.58 | 97.29 | 98.65 |
G-SAE | 97.63 | 95.97 | 98.39 | 98.19 |
LIBSVM | 96.57 | 96.96 | 96.83 | 97.92 |