Fig. 3From: A network-wide view-based detection and mitigation of a sophisticated Interest Flooding AttackPerformance of DMNWVBack to article page