Fig. 4From: Survey of intrusion detection systems: techniques, datasets and challengesClassification as the taskBack to article page