Algorithm 4From: Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learningNormal/attack classification in phase 3Back to article page