Fig. 5From: Using deep learning to solve computer security challenges: a surveyStatistics of Phase II methods for various types of NNsBack to article page