Fig. 8From: Network intrusion detection using data dimensions reduction techniquesThe change in the merits concerning the change in the parameter p on the proposed data setBack to article page