Fig. 13From: Transfer learning for detecting unknown network attacksLearning curves on different training size. a DoS →Probe. b DoS →R2L. c Probe →R2LBack to article page