Research Article

Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection

Figure 2

Fusion process.