Fig. 3From: Performance evaluation of deep learning techniques for DoS attacks detection in wireless sensor networkStructure of intrusion detection systemBack to article page