Research Article

An Effective Fault-Tolerant Intrusion Detection System under Distributed Environment

Figure 2

Flow chart of data detector.