Fig. 10From: Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision treeTPR ValidationBack to article page