Research Article

A Network Security Situation Prediction Method through the Use of Improved TCN and BiDLSTM

Figure 18

Fitting curves of each model on dataset 2.