Author(s): E. Hjelmvik
Publication date: 2011
Journal: NETRESEC (Network Forensics and Network Security Monitoring)