Research Article

An Effective Fault-Tolerant Intrusion Detection System under Distributed Environment

Figure 4

Flow chart of data analysis center.