Skip to main content
. 2021 Sep 12;21(18):6116. doi: 10.3390/s21186116

Figure 12.

Figure 12

Changing the CPU load when analyzing raw data for node i under conditions of a SYN flood attack.