Fig. 11From: Network security situation prediction based on feature separation and dual attention mechanismComparison results with other existing methods on AWIDBack to article page