Fig. 2From: Apply machine learning techniques to detect malicious network traffic in cloud computingIn Frequency number & out frequency number [2]Back to article page