Research Article

Network Intrusion Detection with Threat Agent Profiling

Figure 8

Elbow method for all three clustering methods.