Fig. 9From: Adaptive security monitoring for next-generation routersMonitoring graph entries [28]Back to article page