Research Article
Trust in Intrusion Detection Systems: An Investigation of Performance Analysis for Machine Learning and Deep Learning Models
Table 7
Feature selection of WSN dataset using p values.
| Feature No | Feature name | value | Statistically significant |
| 1 | Time | 7.00E − 93 | Yes | 2 | Is_CH | 0 | No | 3 | who_CH | 0 | No | 4 | Dist_To_CH | 1.47E − 24 | Yes | 5 | ADV_S | 0 | No | 6 | ADV_R | 0 | No | 7 | JOIN_S | 0 | No | 8 | JOIN_R | 5.93E − 06 | Yes | 9 | SCH_S | 0 | No | 10 | SCH_R | 0 | No | 11 | Rank | 0.009842 | Yes | 12 | DATA_S | 1.31E − 32 | Yes | 13 | DATA_R | 0 | No | 14 | Data_Sent_To_BS | 0 | No | 15 | dist_CH_To_BS | 0 | No | 16 | send_code | 2.44E − 125 | Yes | 17 | Consumed energy | 0 | No |
|
|