Fig. 4From: Apply machine learning techniques to detect malicious network traffic in cloud computingFlowchart showing method in the researchBack to article page