Summary

In this chapter, we studied different malicious data types along with malicious injections in wireless sensors. We also covered the different types of decision trees, which included categorical and continuous variable decision trees. This chapter then concluded by revisiting malicious URL detection with decision trees. 

In the next chapter, we will learn about how can we catch impersonators and hackers red-handed.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset