G GIACINTO, R Perdisci, M Del Rio, F ROLI - INFORMATION FUSION, 2008 - iris.unica.it
Since the early days of research on intrusion detection, anomaly-based approaches have
been proposed to detect intrusion attempts. Attacks are detected as anomalies when …