Fig. 12From: Adaptive security monitoring for next-generation routersIntegrity checking: hash calculation of a modified codeBack to article page