Fig. 1From: An intrusion detection method for internet of things based on suppressed fuzzy clusteringOverall data size vs. detection efficiencyBack to article page