Fig. 2From: Network security situation prediction based on feature separation and dual attention mechanismWorking progress of feature separationBack to article page