Flow forensic analysis on traffic pattern and bandwidth utilization for network security management (original) (raw)

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.