Next Article in Journal
Reliability Techniques in Industrial Design
Next Article in Special Issue
Development of Fingerprint Identification Based on Device Flow in Industrial Control System
Previous Article in Journal
Detection of Primary User Emulation Attack Using the Differential Evolution Algorithm in Cognitive Radio Networks
Previous Article in Special Issue
FF-MR: A DoH-Encrypted DNS Covert Channel Detection Method Based on Feature Fusion
 
 
Article
Peer-Review Record

MSLCFinder: An Algorithm in Limited Resources Environment for Finding Top-k Elephant Flows

Appl. Sci. 2023, 13(1), 575; https://doi.org/10.3390/app13010575
by Xianlong Dai 1,2,3, Guang Cheng 1,2,3,*, Ziyang Yu 1,2,3, Ruixing Zhu 1,2,3 and Yali Yuan 1,2,3
Reviewer 1:
Reviewer 3:
Appl. Sci. 2023, 13(1), 575; https://doi.org/10.3390/app13010575
Submission received: 30 November 2022 / Revised: 24 December 2022 / Accepted: 27 December 2022 / Published: 31 December 2022
(This article belongs to the Special Issue Network Traffic Security Analysis)

Round 1

Reviewer 1 Report

First of all, thank you very much for the material you sent. This material is definitely neat.

The methodology is correct. However, it is not sufficiently described. Details were missing. And the authors can supplement it.

The results are correct and well validated.

The authors nevertheless describe the work of other researchers in more detail.

Best regards

Author Response

Please see the attachment.

Author Response File: Author Response.docx

Reviewer 2 Report

The authors proposed a novel strategy, called count-with-uth-level-sampling in this paper, to find top-k elephant flows in limited resource environments. Moreover, the proposed algorithm called MSLCFinder incurs lightweight counter and uth-level multi-sampling with small, constant processing for millions of flows.  Overall, this paper is well written. However, the authors should address the following three oncerns to further improve the quality of this paper.

1- Please add a table for related works in page 2.

2- The energy cost of the proposed strategy should be evaluated.

3- The complexity of the proposed strategy should be evaluated.

Author Response

Please see the attachment

Author Response File: Author Response.docx

Reviewer 3 Report

Comment are as follows.

1) Paper is well written, but authors must compare his results with recent literature.

2)  Explain future work in bit more detail in conclusion section.

Author Response

Please see the attachment.

Author Response File: Author Response.docx

Back to TopTop