Fig. 10From: Network security situation prediction based on feature separation and dual attention mechanismComparison results with other existing methods on UNSW-NB15Back to article page