Fig. 2.From: Entropy clustering-based granular classifiers for network intrusion detectionAn overall flowchart of design of ECGCBack to article page