Algorithm 3From: Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learningFeature reduction in phase 2Back to article page