Fig. 5From: Intrusion detection system for controller area networkLabeling done by a functionBack to article page