Fig. 1From: Transfer learning for detecting unknown network attacksComparison between the HeTL and CeHTLBack to article page