Fig. 5From: Big data analysis and distributed deep learning for next-generation intrusion detection system optimizationContextual anomaly example [4]Back to article page