Research Article

An Attribute Extraction for Automated Malware Attack Classification and Detection Using Soft Computing Techniques

Figure 10

Different techniques for selecting features in relation to classification techniques that use 80% of the information for trained and 20% for tests.