Experiments and Experiment Results

I continue to share how I did my master’s thesis titled Comparison of Machine Learning Algorithms for the Detection of Vulnerability of RPL-Based IoT Devices, my experiences in this process, and the codes in this thesis in a series of articles on my blog.

In this article, we will train the processed data and detect the attack with machine learning algorithms in the RPL protocol.