Research Article

A Fusion of Multiagent Functionalities for Effective Intrusion Detection System

Figure 5

Recall analysis with various , and number of attackers.
(a)
(b)
(c)