Fig. 4From: Big data analysis and distributed deep learning for next-generation intrusion detection system optimizationCollective anomaly example [4]Back to article page