Fig. 8From: Survey of intrusion detection systems: techniques, datasets and challengesFragment – OverwriteBack to article page