PK Chan, MV Mahoney, MH Arshad - Managing Cyber Threats: Issues …, 2005 - Springer
Much of the intrusion detection research focuses on signature (misuse) detection, where
models are built to recognize known attacks. However, signature detection, by its nature …