Edge-IIoTset Cyber Security Dataset of IoT & IIoT

The proposed approach for the FTL algorithms consists of a client-server architecture, where the models generated from the client data are utilized to update the server model in the setup.

Data and Resources

Cite this as

Lochana Telugu Rajesh, Tapadhir Das, Raj Mani Shukla, Shamik Sengupta (2024). Dataset: Edge-IIoTset Cyber Security Dataset of IoT & IIoT. https://doi.org/10.57702/vbr6dyj9

DOI retrieved: December 16, 2024

Additional Info

Field Value
Created December 16, 2024
Last update December 16, 2024
Defined In https://doi.org/10.48550/arXiv.2310.07354
Author Lochana Telugu Rajesh
More Authors
Tapadhir Das
Raj Mani Shukla
Shamik Sengupta
Homepage https://doi.org/10.1109/ACCESS.2022.3144446