Research Article

Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection

Figure 3

The parameter encoding approach.