Research Article

Network Intrusion Detection Method Combining CNN and BiLSTM in Cloud Computing Environment

Figure 6

Curve of acc-loss.