J Frank - Proceedings of the 17th national computer security …, 1994 - engineering.iastate.edu
… In systems such as DIDS SnBr], MIDAS SeSh], TIM TeCh] and NSM HeDi], data ltering is
done using heuristic or ad hoc methods, which can be viewed as expert rules for ltering. Other …