Research Article

Optimization Enabled Deep Learning-Based DDoS Attack Detection in Cloud Computing

Figure 4

The algorithmic assessment based on BOT-IoT, (a) testing accuracy, (b) TPR, and (c) TNR.
(a)
(b)
(c)