Fig. 2From: Tackling imbalanced data in cybersecurity with transfer learning: a case with ROP payload detectionThe flow diagram of DeepReturn in productionBack to article page