Fig. 1From: Tackling imbalanced data in cybersecurity with transfer learning: a case with ROP payload detectionWorkflow of ROP attacksBack to article page