C Livadas, R Walsh, D Lapsley… - Proceedings. 2006 31st …, 2006 - ieeexplore.ieee.org
To date, techniques to counter cyber-attacks have predominantly been reactive; they focus
on monitoring network traffic, detecting anomalies and cyber-attack traffic patterns, and, a …