Fig. 4From: Network security situation prediction based on feature separation and dual attention mechanismLimited attention modelBack to article page