Fig. 6From: Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learningAverage correlation score for each feature in pre-processed TON-IoTBack to article page