Fig. 9From: Deep learning approach to security enforcement in cloud workflow orchestrationClustering performance evaluationBack to article page