Fig. 11From: Adaptive security monitoring for next-generation routersIntegrity checking: hash calculation of a benign codeBack to article page