Fig 1.
IoT deployment.
Fig 2.
Accuracy comparison by attack type.
Fig 3.
Correlation heatmap of selected features.
Fig 4.
Enhanced intrusion detection framework: Proposed model.
Table 1.
Labels of normal and attack classes in the CICIDS-2017 dataset.
Table 2.
Summary of attack instances and detection accuracy.
Fig 5.
Distribution of attack types in dataset.
Table 3.
Number of features selected.
Table 4.
Comparison of performance metrics with other models.
Fig 6.
Confusion Matrix – PSO-GA+ ELM-BA Model.
Fig 7.
ROC Curve – PSO-GA+ELM-BA vs. baseline models.
Table 5.
Comparison of performance metrics with other models.
Table 6.
Accuracy against each attack (class-wise performance).
Fig 8.
Normal vs abnormal traffic.
Table 7.
Comparison with recent studies: Comparison with recent studies.