Research Article
On Detecting and Removing Superficial Redundancy in Vector Databases
Table 3
The filtered database of Table
2 after removing the superficial redundancies Types I, II, and III.
| Attacker Region Code | Attacker Port | Target Type IP | Time Stamp |
| 35 | 137 | static | 23:56:24 | 56 | 1456 | static | 23:56:39 | 67 | 1456 | dynamic | 23:57:02 | 67 | 378 | dynamic | 23:57:43 |
|
|