Protocol scrubbing: network security through transparent flow modification | IEEE Journals & Magazine | IEEE Xplore