Figure 8. Graph for the Payload and Session against Time Showing Behavior of Moderate Suspicious Traffic

From

Identification of Hidden VoIP (Grey Traffic)

Ch. M. Asim Rasheed, Ayesha Khaliq, Ammara Sajid, Sana Ajmal

Journal of Computer Networks. 2013, 1(2), 15-27 doi:10.12691/jcn-1-2-1