Fig. 7From: Big data analysis and distributed deep learning for next-generation intrusion detection system optimizationOur datasetBack to article page