Fig. 9From: Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision treeTPR ValidationBack to article page