Fig. 10From: Adaptive security monitoring for next-generation routersSimulation results [28]Back to article page