Fig. 4From: A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challengesConceptual working of AIDS approaches based on machine learningBack to article page