Fig. 2From: Network intrusion detection using data dimensions reduction techniquesFilter methodBack to article page