Description:and sensitivity analysis to hedge on the prediction outcomes including negative selection, on one cyber security (e.g., spam, phishing, fake internet accounts, and fraud ception (D&D) to evade detection and to deceive defenses. zation that such intertwined learning methods are consonant with the