Fig. 8
From: SCADA intrusion detection using deep factorization machines

Scatter chart of TotPkts, TotBytes, SrcPkts, DstPkts, SrcBytes features vs target.
From: SCADA intrusion detection using deep factorization machines

Scatter chart of TotPkts, TotBytes, SrcPkts, DstPkts, SrcBytes features vs target.