Research Article

On Detecting and Removing Superficial Redundancy in Vector Databases

Table 3

The filtered database of Table 2 after removing the superficial redundancies Types I, II, and III.

Attacker
Region
Code
Attacker
Port
Target
Type
IP
Time
Stamp

35 137static 23:56:24
561456 static 23:56:39
67 1456 dynamic 23:57:02
67 378 dynamic 23:57:43