Fig. 5From: Hypergraph clustering model-based association analysis of DDOS attacks in fog computing intrusion detection systemMaximum number of UE accessBack to article page