The Comparison of Cybersecurity Datasets

Almost all industrial internet of things (IIoT) attacks happen at the data transmission layer according to a majority of the sources. In IIoT, different machine learning (ML) and deep learning (DL) techniques are used for building the intrusion detection system (IDS) and models to detect the attacks...

Full description

Bibliographic Details
Main Authors: Ahmed Alshaibi, Mustafa Al-Ani, Abeer Al-Azzawi, Anton Konev, Alexander Shelupanov
Format: Article
Language:English
Published: MDPI AG 2022-01-01
Series:Data
Subjects:
Online Access:https://www.mdpi.com/2306-5729/7/2/22