Fig. 6From: A novel two-phase cycle algorithm for effective cyber intrusion detection in edge computingTest performance of the proposed approach for DATASUBSET1Back to article page