Fig. 8From: Intrusion detection system for controller area networkGraph for function defined in Eq. 3Back to article page