Fig. 5From: A Transformer-based network intrusion detection approach for cloud securityComparison of detection precision trends when Encoder=3,4,5Back to article page