Manipulation of Network Traffic Traces for Security Evaluation | IEEE Conference Publication | IEEE Xplore