Research Article

Cache Pollution Detection Method Based on GBDT in Information-Centric Network

Figure 6

Relationship between attack strength and correctness.