Fig. 7From: Tackling imbalanced data in cybersecurity with transfer learning: a case with ROP payload detectionFPR & F1 versus number of validation dataBack to article page