Research Article
Securing the IoT System of Smart City against Cyber Threats Using Deep Learning
Figure 5
(a) Attack distribution in weather dataset; (b) attack distribution in thermostat dataset; (c) attack distribution in GPS tracker dataset; (d) attack distribution in fridge dataset; (e) attack distribution in garage door dataset; (f) attack distribution in motion light; (g) attack distribution in Modbus.
| (a) |
| (b) |
| (c) |
| (d) |
| (e) |
| (f) |
| (g) |