Fig. 9From: Network security situation prediction based on feature separation and dual attention mechanismComparison results of three methods on two data setsBack to article page