Research Article

Toward Identifying APT Malware through API System Calls

Figure 13

Whether the model uses the contrast of attention.