Fig. 6From: Deep learning approach to security enforcement in cloud workflow orchestrationAutoEncoder reconstruction lossBack to article page