Building an ensemble model for network intrusion detection and prevention — All Images unless otherwise noted are by the author Introduction What happens when cyber criminals face robots? What happens when they use robots? How will offensive and defensive strategies of cybersecurity evolve as artificial intelligence continues to grow? Both artificial intelligence and cybersecurity have consistently landed in the top charts of…