Fig. 3
From: A novel multi-scale network intrusion detection model with transformer

(A) The architecture of transformer-based backbone. (B) Illustration of the calculation of self-attention.
From: A novel multi-scale network intrusion detection model with transformer

(A) The architecture of transformer-based backbone. (B) Illustration of the calculation of self-attention.