Fig. 7From: Adaptive security monitoring for next-generation routersHardware monitoring graph representation [28]Back to article page