An experimental evaluation to determine if port scans are precursors to an attack | IEEE Conference Publication | IEEE Xplore