Fig. 8From: Adaptive security monitoring for next-generation routersDisassembled application code [28]Back to article page