Fig. 3From: Using deep learning to solve computer security challenges: a surveyStatistics of Phase II methods for eight security problemsBack to article page