Return to Article Details
Analysis of Computational Resource Consumption of an Intrusion Detection System Based on Containerized Network Functions Virtualization
Download
Download PDF