Fig. 2From: Using deep learning to solve computer security challenges: a surveyClassification tree for different Phase III methods. Here, consideration, adoption, and comparison indicate that a work considers Phase III, adopts Phase III and makes comparison with other methods, respectivelyBack to article page