Fig. 11From: Fusion of transformer and ML-CNN-BiLSTM for network intrusion detectionComparison of detection time under different sample numbersBack to article page