Edge-IIoTset Cyber Security Dataset of IoT & IIoT

The proposed approach for the FTL algorithms consists of a client-server architecture, where the models generated from the client data are utilized to update the server model in the setup.

BibTex: