Research Article

The Application of Computer Intelligence in the Cyber-Physical Business System Integration in Network Security

Figure 2

Flowchart of horizontal override detection based on LSTM-AutoEncoder.