Fig. 11From: Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learningThe run time of FS and FE with reduced features in binary classificationBack to article page