Skip to main content

Table 3 Creation of DMF table

From: A study on efficient detection of network-based IP spoofing DDoS and malware-infected Systems