Research Article

Integrating Traffics with Network Device Logs for Anomaly Detection

Figure 3

The F1 value obtained by each method over the XSS attack.