Research Article

Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection

Figure 4

The algorithm for creating the dictionary D.