Fig. 3From: Conceptualisation of Cyberattack prediction with deep learningVisualisation of the Pre-trained SamplesBack to article page