From: Intrusion detection system for controller area network
Functions | d | Functions | d |
---|---|---|---|
\(F_1, F_2\) | 0.8889 | \(F_2, F_4\) | 0.8889 |
\(F_1, F_3\) | 0.75 | \(F_2, F_5\) | 1 |
\(F_1, F_4\) | 1 | \(F_3, F_4\) | 0.8889 |
\(F_1, F_5\) | 0.8889 | \(F_3, F_5\) | 1 |
\(F_2, F_3\) | 1 | \(F_4, F_5\) | 0.75 |