Return to Article Details Cyber Attacks Mitigation: Detecting Malicious Activities in Network Traffic – A Review of Literature Download Download PDF