Fig. 2From: Adaptive security monitoring for next-generation routersMonitoring system logicBack to article page