Fig. 3From: On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detectionThe process of convolution and max-pooling in the system call intrusion-detection modelBack to article page