Research Article

Application of a New Feature Generation Algorithm in Intrusion Detection System

Figure 5

Comparison of feature generation time and cost on the NSL-KDD dataset.