Table 5 Transformed data.
From: Towards advanced AI-based solutions for securing IoMT in smart health information systems
Feature 1 (source ID) | Feature 2 (protocol) | Feature 3 (packet size) | Feature 4 (flow duration) | Label (normal/malicious) |
|---|---|---|---|---|
1 | 0 | 120 | 500 | Normal |
2 | 1 | 150 | 600 | Malicious |
3 | 2 | 180 | 700 | Normal |
4 | 0 | (Missing) | 800 | Malicious |
5 | 1 | 250 | 900 | Normal |