Research Article
LNNLS-KH: A Feature Selection Method for Network Intrusion Detection
Figure 12
Comparison of feature selection time and intrusion detection time for different feature selection algorithms. (a) Feature selection time for different feature selection algorithms. (b) Intrusion detection time of different feature selection algorithms.
(a) |
(b) |