Fig. 5From: Detecting web attacks with end-to-end deep learningt-SNE Visualization of Normal and Abnormal RequestsBack to article page