Fig. 3From: Tackling imbalanced data in cybersecurity with transfer learning: a case with ROP payload detectionThe flow diagram for the data preparation process in DeepReturnBack to article page