Research Article

LNNLS-KH: A Feature Selection Method for Network Intrusion Detection

Figure 12

Comparison of feature selection time and intrusion detection time for different feature selection algorithms. (a) Feature selection time for different feature selection algorithms. (b) Intrusion detection time of different feature selection algorithms.
(a)
(b)