Table 5 Transformed data.

From: Towards advanced AI-based solutions for securing IoMT in smart health information systems

Feature 1 (source ID)

Feature 2 (protocol)

Feature 3 (packet size)

Feature 4 (flow duration)

Label (normal/malicious)

1

0

120

500

Normal

2

1

150

600

Malicious

3

2

180

700

Normal

4

0

(Missing)

800

Malicious

5

1

250

900

Normal