Fig. 2From: An intrusion detection method for internet of things based on suppressed fuzzy clusteringOverall data size vs. detection accuracyBack to article page