Skip to main content
. 2021 Sep 26;21(19):6432. doi: 10.3390/s21196432

Figure 9.

Figure 9

The main categories of attacks are found in the IoTID20 dataset.