Fig. 2From: Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurityDistribution of malware categories prior to SMOTE balancingBack to article page