Fig. 2From: Intrusion detection in cloud computing based on time series anomalies utilizing machine learningProphet’s cross-validation processBack to article page