Research Article

Network Intrusion Detection Method Combining CNN and BiLSTM in Cloud Computing Environment

Figure 4

Schematic diagram of network intrusion detection based on CNN-BiLSTM.