Fig. 3From: Deep learning approach to security enforcement in cloud workflow orchestrationHigh level diagram of the proposed approachBack to article page