Research Article

Optimization Enabled Deep Learning-Based DDoS Attack Detection in Cloud Computing

Figure 5

The algorithmic assessment based on NSL-KDD, (a) testing accuracy, (b) TPR, and (c) TNR.
(a)
(b)
(c)