Fig. 9From: Transfer learning for detecting unknown network attacksAccuracy comparison with different combinations of k and β, sample = 1000. a DoS →Probe. b DoS →R2L. c Probe →R2LBack to article page