Fig. 4From: Using deep learning to solve computer security challenges: a surveyStatistics of Phase II methods on type of dataBack to article page