Fig. 7From: Deep learning approach to security enforcement in cloud workflow orchestrationOne-class SVM tuning and accuracyBack to article page