Research Article

A Collaborative Detection Method of Wireless Mobile Network Intrusion Based on Cloud Computing

Figure 3

Comparison of the number of information discarded.