Research Article

Integrating Traffics with Network Device Logs for Anomaly Detection

Figure 5

The F1 value obtained by each method over the P2P botnet.