Fig. 7From: Transfer learning for detecting unknown network attacksPerformance comparison of feature-based transfer learning approaches on DoS → R2LBack to article page