Fig. 5
From: Orchestrating machine learning models in a swarm architecture for IoT inline malware detection

Data distribution vs the attack type in the dataset.
From: Orchestrating machine learning models in a swarm architecture for IoT inline malware detection

Data distribution vs the attack type in the dataset.