Research Article

A Persistent Route Diversification Mechanism for Defending against Stealthy Crossfire Attack

Figure 6

Workflow for identifying attack intention.