Fig. 7From: A novel two-phase cycle algorithm for effective cyber intrusion detection in edge computingTraining performance of the proposed approach for DATASUBSET2Back to article page