Fig. 1From: A novel two-phase cycle algorithm for effective cyber intrusion detection in edge computingTraining session of the proposed methodologyBack to article page