Research Article

Network Intrusion Detection Method Based on PCA and Bayes Algorithm

Figure 5

The relationships between the detection time and the execution number.