The Comparison of Cybersecurity Datasets
Almost all industrial internet of things (IIoT) attacks happen at the data transmission layer according to a majority of the sources. In IIoT, different machine learning (ML) and deep learning (DL) techniques are used for building the intrusion detection system (IDS) and models to detect the attacks...
| Published in: | Data |
|---|---|
| Main Authors: | , , , , |
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2022-01-01
|
| Subjects: | |
| Online Access: | https://www.mdpi.com/2306-5729/7/2/22 |
