Research Article
An Attribute Extraction for Automated Malware Attack Classification and Detection Using Soft Computing Techniques
Table 7
Different techniques for selecting features in relation to classification techniques that use 80% of the information for trained and 20% for tests.
|