__________ scans for attack signatures in the context of a traffic stream rather than individual packets.
A. Pattern matching B. Protocol anomaly
C. Traffic anomaly D. Stateful matching
A. Pattern matching
Computer Science & Information Technology