“…Much of this research focuses on detection. For example, researchers have studied malware detection (Kolter & Maloof, ; Souri & Hosseini, ), network intrusion detection (Shah, Qian, Kumar, Ali, & Alvi, ; Zhu, Premkumar, Zhang, & Chu, ), suspicious debit card transactions (Saghehei & Memariani, ), insider threat detection (Legg, Buckley, Goldsmith, & Creese, ), and phishing detection (Thabtah & Abdelhamid, ) using analytics methods. Many of these are low base rate problems, or problems in which the class of interest makes up only a small portion of the overall sample.…”