Fig. 6From: Network intrusion detection using data dimensions reduction techniquesThe overall structure of the proposed methodBack to article page