Research Article

On Detecting and Removing Superficial Redundancy in Vector Databases

Table 2

Example of a vector database.

Attacker
Region Code
Attacker
Port
Source
Region Code
Source
Port
Target
Port
Target
Region Code
Target
Type IP
Time
Stamp

351373513745static23:56:24
56145656145645static23:56:39
67145667145645dynamic23:57:02
673786737845dynamic23:57:43