Figure 4.

Setup for testing the proposed optimized IDS approach.

Bakhoum EURASIP Journal on Information Security 2011 2011:2   doi:10.1186/1687-417X-2011-2
Download authors' original image