Title |
Provides the title of research paper |
Approach used |
List the different approaches related to the DL used in the paper |
Datasets |
List the different datasets used in the paper for the evaluation purpose |
Number of features |
List the selected features from the datasets |
Attack and legitimate classes identified |
Provides the name of attacks used in the paper |
Preprocessing strategy |
Describes the preprocessing processes used before training the model |
Experiment setup/performance optimization of the model |
Explains about how the experiment is done/list different parameter values of the model at which it gives best performance |
Performance metrics |
Provides the results and through these metrics we can compare one model with another model |
Strength |
List the good points about the model |
Weakness |
List the weak points of the model |
Summary |
A concise explanation about the above fields |