Return to Article Details Feature selection using closeness to centers for network intrusion detection Download Download PDF