In Internet of Things, the network devices have been more vulnerable to various intrusion attacks. Most of the existing algorithms are trained in a centralized manner, which may cause external ...
However, traditional security methods struggle to cope with these attacks due to the limited computational power of IoT devices and the dynamic nature of cyber threats. Anomaly-based intrusion ...