Review Article

Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection

Figure 5

Comparison among different ML and MH techniques on the basis of detection rate from Table 7.