Fig. 3From: Network intrusion detection using data dimensions reduction techniquesTriangular membership functionBack to article page