Fig. 3From: Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision treeHeat map of attacksBack to article page