Research Article

Using Graph Representation in Host-Based Intrusion Detection

Figure 9

Param analysis of GRSE with different and (AUC).