Fig. 4From: Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learningProportions of the 10 classes in training and test set of TON-IoTBack to article page