Fig. 6From: Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision treePredicator importance in the CHAID modelBack to article page