Research Article

Optimization Enabled Deep Learning-Based DDoS Attack Detection in Cloud Computing

Figure 6

Comparative analysis in terms of BOT-IoT, (a) testing accuracy, (b) TPR, (c) TNR, and (d) ROC.
(a)
(b)
(c)
(d)