Fig. 6From: Using deep learning to solve computer security challenges: a surveyStatistics of Phase II methods for various output of NNBack to article page