Research Article

A Fusion of Multiagent Functionalities for Effective Intrusion Detection System

Figure 6

False detection analysis with , and number of attackers.
(a)
(b)
(c)