Bummer! This is just a preview. You need to be signed in with an account to view the entire instruction.

Well done!

You have completed (UPI) Chapter 19: AI in Cybersecurity!

Instruction

19.4.2 Evaluation Method

In the following part, we introduce the method applied to evaluate our experiment results. In the evaluation phase, we utilize a type of 3-fold cross-validation. So, we choose 2/3 of files as training data in each experiment, while the rest of the data is allocated to the test set. As a matter of fact, in order to get a trustworthy capability estimation, we averaged the results of 10 cross-vali...