Fig. 5From: Keeping pace with the creation of new malicious PDF files using an active-learning based detection frameworkBreakdown of the threats identified among the malicious PDF files found in our datasetBack to article page