Fig. 5From: Intrusion detection systems for IoT-based smart environments: a surveyIDS operations. IDS operations can be divided into the monitoring stage, the analysis stage and the detection stageBack to article page