From: ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense
 | Target port | Signature | ||
---|---|---|---|---|
T | \(q^{n}_{i}(\Omega)\) | \(q^{n}_{i}(G)\) | \(q^{n}_{i}(\Omega)\) | \(q^{n}_{i}(G)\) |
0.05 | 26.51 | 25.17 | 22.05 | 18.88 |
0.10 | 12.97 | 9.8 | 6.08 | 3.22 |
0.15 | 4.88 | 3.44 | 3.61 | 2.77 |
0.20 | 3.46 | 1.49 | 2.59 | 1.23 |
0.25 | 1.29 | 0 | 0.86 | 0 |
0.30 | 0.7 | 0 | 0.41 | 0 |
0.35 | 0.53 | 0 | 0.3 | 0 |
0.40 | 0.38 | 0 | 0.14 | 0 |
0.45 | 0.34 | 0 | 0.12 | 0 |
0.50 | 0.13 | 0 | 0.05 | 0 |