JP Early,
CE Brodley - Machine learning and data mining for computer …, 2006 - Springer
Research in network intrusion detection has traditionally been divided into two components–
misuse detection and anomaly detection. The distinction between the two comes from the …