Fig. 10From: Deep learning approach to security enforcement in cloud workflow orchestrationCPU utilization and memory usage during an anomaly attackBack to article page