Research Article

Optimization Enabled Deep Learning-Based DDoS Attack Detection in Cloud Computing

Figure 7

Comparative assessment based on NSL-KDD, (a) testing accuracy, (b) TPR, (c) TNR, and (d) ROC.
(a)
(b)
(c)
(d)