Research Article

Network Intrusion Detection Method Combining CNN and BiLSTM in Cloud Computing Environment

Figure 11

Comparison of FPR under different attack types.