Fig. 6From: Apply machine learning techniques to detect malicious network traffic in cloud computingModel accuracy comparison with split-validationBack to article page