Fig. 2From: Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision treeConditional Box Plot of attacksBack to article page