Fig. 6From: A Transformer-based network intrusion detection approach for cloud securityComparison of detection performance indicators when Encoder=3,4,5Back to article page