Fig. 4
From: SCADA intrusion detection using deep factorization machines

TotPkts, TotBytes, SrcPkts, DstPkts, SrcBytes features histogram.
From: SCADA intrusion detection using deep factorization machines

TotPkts, TotBytes, SrcPkts, DstPkts, SrcBytes features histogram.