Fig. 4From: A Transformer-based network intrusion detection approach for cloud securityComparison of training accuracy trends when Encoder=3,4,5Back to article page