Comparison of Data Dimension Reduction Methods in The Problem of Detecting Attacks | IEEE Conference Publication | IEEE Xplore