Research Article
Optimization Enabled Deep Learning-Based DDoS Attack Detection in Cloud Computing
Table 4
Computational time analysis.
| ||||||||||||||||||||||||||||||||||||||||
Bold values show higher performance compared to other methods. |
| ||||||||||||||||||||||||||||||||||||||||
Bold values show higher performance compared to other methods. |