Fig. 6From: A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challengesAn example of classification by k-Nearest Neighbour for kâ=â5Back to article page