Fig. 10From: A novel botnet attack detection for IoT networks based on communication graphsDetail of the storage reduction for each file of the experiment. Comparison of rows and storage bytes between the original and the generated fileBack to article page