Fig. 5From: Fusion of transformer and ML-CNN-BiLSTM for network intrusion detectionMultiscale convolution module M-moduleBack to article page