Fig. 15From: Detecting web attacks with end-to-end deep learningPerformance of Different Machine Learning Algorithm Under Different Unique Feature RatiosBack to article page