August 2019
Intermediate to advanced
342 pages
9h 35m
English
After having analyzed the Perceptron and the SVM, we now deal with alternative classification strategies that make use of logistic regression and decision trees.
But before continuing, we will discover the distinctive features of these algorithms and their use for spam detection and phishing, starting with regression models.
Read now
Unlock full access