Research Article

Network Intrusion Detection Method Combining CNN and BiLSTM in Cloud Computing Environment

Figure 10

Comparison of FA under different attack types.