Figure 9From: IP traceback through (authenticated) deterministic flow marking: an empirical evaluationTR, MR, and normalized NB for different values of K for the DFM approach. (a) Darpa attack data set. (b) Darpa attack-free data set. (c) CISDA data set. (d) MAWI data set. (e) Dal2010 data set.Back to article page