Fig. 4From: Detecting web attacks with end-to-end deep learningCall Graph (N=2) (L) and Call Tree (Allowing unrestricted N) (R) Constructed for a Simple Series of Call Stack TracesBack to article page