Fig. 1From: Study of methods for endpoint aware inspection in a next generation firewallEndpoint application identification taxonomy as covered in this paperBack to article page