Fig. 17From: Low-rate DoS attack detection based on two-step cluster analysis and UTR analysisResults of two-step cluster analysisBack to article page