Research Article

Network Intrusion Detection Method Based on FCWGAN and BiLSTM

Figure 4

Schematic diagram of model structure based on FCWGAN and BiLSTM.