Fig. 8From: Detecting cybersecurity attacks across different network features and learnersBox plots of F1-score grouped by feature group/ selection technique; here datasets include destination port; Tukey’s HSD test indicates feature selection techniques 2 and 3 are not significantly different, other techniques are in groups by themselvesBack to article page