Fig. 14
From: Network security analysis based on feature selection and optimized fireworks algorithm

The comparison of the identification accuracy of different algorithms for malicious behaviors in the same data set.
From: Network security analysis based on feature selection and optimized fireworks algorithm

The comparison of the identification accuracy of different algorithms for malicious behaviors in the same data set.