Research Article

A Deep Intelligent Attack Detection Framework for Fog-Based IoT Systems

Algorithm 1

Method of choosing the finest DL model for the fog tier.
Input: ,
Output:
(1);
(2));
(3)for to do
(4)  ;
(5)  ;
(6)  ;           ⊳ cal: calculate
(7)end for
(8);