Fig. 11From: Network intrusion detection using data dimensions reduction techniquesThe comparison results of the proposed method with other methodBack to article page