Skip to main content

Table 6 Summary of Algorithms used

From: Performance evaluation of deep learning techniques for DoS attacks detection in wireless sensor network

Algorithm

Hidden layers

Hidden size / Filter size

DNN

1

32

CNN

1

32

RNN

1

32

CNN+RNN

2

[32, 32]