Fig. 8From: Network security situation prediction based on feature separation and dual attention mechanismComparison results with one-hot method on two data setsBack to article page