An approach to detect network attacks applied for network forensics | IEEE Conference Publication | IEEE Xplore