Fig. 4From: Network intrusion detection using data dimensions reduction techniquesThe triangular fuzzy numberBack to article page