Fig. 2From: Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learningThe features of network TON_IoT before and after numerically encodedBack to article page