Research Article

Analyzing IoT Attack Feature Association with Threat Actors

Algorithm 1

Optimization of features based on Delphi method.
1. begin
2. ;
3. End until (Fp==Null);
4. Last_M123←classify X;
5. Insert the feature into ;
6. ;
7.     for feature is not Null
8.         insert the feature into ;
9.         X is a dataset of sample values for ;
10.     if
11.         Remove features from ;
12.         else
13.            ;
14.     end if
15.   end for
Reture;