Research Article

Network Intrusion Detection Method Combining CNN and BiLSTM in Cloud Computing Environment

Figure 9

Comparison of AC under different attack types.