Fig. 3From: Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learningProportions of the normal/attack classes in training and test set of TON-IoTBack to article page