Fig. 7From: Survey of intrusion detection systems: techniques, datasets and challengesROC curveBack to article page