December 2018
Intermediate to advanced
318 pages
8h 28m
English
In this chapter, we studied different malicious data types along with malicious injections in wireless sensors. We also covered the different types of decision trees, which included categorical and continuous variable decision trees. This chapter then concluded by revisiting malicious URL detection with decision trees.
In the next chapter, we will learn about how can we catch impersonators and hackers red-handed.
Read now
Unlock full access