Research Article
Analyzing IoT Attack Feature Association with Threat Actors
Algorithm 1
Optimization of features based on Delphi method.
1. begin | 2. ; | 3. End until (Fp==Null); | 4. Last_M123←classify X; | 5. Insert the feature into ; | 6. ; | 7. for feature is not Null | 8. insert the feature into ; | 9. X is a dataset of sample values for ; | 10. if | 11. Remove features from ; | 12. else | 13. ; | 14. end if | 15. end for | Reture; |
|