Читать книгу Deep Learning Approaches to Cloud Security - Группа авторов - Страница 4

List of Tables

Оглавление

1 Chapter 3Table 3.1 Feature extraction techniques [8].Table 3.2 Classification techniques.

2 Chapter 6Table 6.1 Classified results of classifiers.Table 6.2 Random forest classification report.Table 6.3 Naïve bayes classification report.Table 6.4 Support vector machine classification report.

3 Chapter 7Table 7.1 Confusion matrix - hold out method.Table 7.2 Confusion matrix - K-fold method.Table 7.3 Evaluation variables.

Deep Learning Approaches to Cloud Security

Подняться наверх