Table 9 CT analysis of CDM-BEOSAEM methodology on the Edge-IIoT dataset.

From: Enhancing cyberthreat defense mechanisms using ensemble of representation learning with binary Ebola optimization search in internet of things environment

Edge-IIoT dataset

Technique

CT (s)

1D CNN

18.15

SVM Method

18.65

GB

20.43

J48 Model

17.78

RNN Algorithm

17.60

LSTM Classifier

15.65

FedMLDL-HPO

19.52

CDM-BEOSAEM

7.99