Skip to main content
. 2019 Jan 8;19(1):203. doi: 10.3390/s19010203

Figure 3.

Figure 3

The architecture of intrusion detection system.