Fig. 1From: Resampling imbalanced data for network intrusion detection datasetsFlow chart of the experimentsBack to article page