Strategic deployment of network monitors for attack attribution | IEEE Conference Publication | IEEE Xplore