Fig. 2From: A Transformer-based network intrusion detection approach for cloud securityThe architecture of designed Transformer modelBack to article page