Fig. 9From: Network intrusion detection using data dimensions reduction techniquesGraph of the change of the two variables P and merit on the CICIDS datasetBack to article page