Fig. 6From: Intrusion detection in cloud computing based on time series anomalies utilizing machine learningComparison between the predicted attack label and the real attack labelBack to article page