Fig. 4From: Deep learning approach to security enforcement in cloud workflow orchestrationExperimentation environmentBack to article page