Fig. 7From: Intrusion detection in cloud computing based on time series anomalies utilizing machine learningComparison between the cross-validation metrics with and without the FS methodBack to article page