Fig. 1From: Using deep learning to solve computer security challenges: a surveyOverview of the four-phase workflowBack to article page