Fig. 3From: Network security situation prediction based on feature separation and dual attention mechanismArchitecture of feature separationBack to article page