Читать книгу Deep Learning Approaches to Cloud Security - Группа авторов - Страница 4
List of Tables
Оглавление1 Chapter 3Table 3.1 Feature extraction techniques [8].Table 3.2 Classification techniques.
2 Chapter 6Table 6.1 Classified results of classifiers.Table 6.2 Random forest classification report.Table 6.3 Naïve bayes classification report.Table 6.4 Support vector machine classification report.
3 Chapter 7Table 7.1 Confusion matrix - hold out method.Table 7.2 Confusion matrix - K-fold method.Table 7.3 Evaluation variables.