Fig. 8From: Transfer learning for detecting unknown network attacksPerformance comparison on heterogeneous spaces on DoS →R2LBack to article page