Abstract: The escalating scale and sophistication of cyberattacks pose a formidable challenge to conventional intrusion detection systems (IDS) because they lack the flexibility to adapt to evolving ...