Efficiency of using mobile agents to trace multiple sources of attack | IEEE Conference Publication | IEEE Xplore