Fig. 11From: Deep learning approach to security enforcement in cloud workflow orchestrationCPU utilization and memory usage with anomaly attack detectionBack to article page