Research Article
An Attribute Extraction for Automated Malware Attack Classification and Detection Using Soft Computing Techniques
Figure 10
Different techniques for selecting features in relation to classification techniques that use 80% of the information for trained and 20% for tests.