Return to Article Details Analysis of Computational Resource Consumption of an Intrusion Detection System Based on Containerized Network Functions Virtualization Download Download PDF