Fig. 1From: Apply machine learning techniques to detect malicious network traffic in cloud computingDetection frameworkBack to article page