Fig. 13From: Detecting web attacks with end-to-end deep learningPerformance of Different Machine Learning Algorithms Under Different Test Coverage RatiosBack to article page