Research Article

An Approach Based on the Improved SVM Algorithm for Identifying Malware in Network Traffic

Figure 6

Comparison of FPRs on NTDS2.