Research Article

Securing the IoT System of Smart City against Cyber Threats Using Deep Learning

Figure 5

(a) Attack distribution in weather dataset; (b) attack distribution in thermostat dataset; (c) attack distribution in GPS tracker dataset; (d) attack distribution in fridge dataset; (e) attack distribution in garage door dataset; (f) attack distribution in motion light; (g) attack distribution in Modbus.
(a)
(b)
(c)
(d)
(e)
(f)
(g)