Research Article

Packet-Based Intrusion Detection Using Bayesian Topic Models in Mobile Edge Computing

Figure 3

Example of data separation for training traffic.