Research Article

Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques

Figure 6

The top 20 features of the Operation C-Major sample.