Research Article
Securing the IoT System of Smart City against Cyber Threats Using Deep Learning
Figure 5
(a) Attack distribution in weather dataset; (b) attack distribution in thermostat dataset; (c) attack distribution in GPS tracker dataset; (d) attack distribution in fridge dataset; (e) attack distribution in garage door dataset; (f) attack distribution in motion light; (g) attack distribution in Modbus.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |