Fig. 5From: Network intrusion detection based on multi-domain data and ensemble-bidirectional LSTMThe recall of each malware detectionBack to article page