MA Maloof, GD Stephens - Recent Advances in Intrusion Detection: 10th …, 2007 - Springer
… We stored this information in a database, and Table 3 shows an example. With this contextual
information, we were able to build simple social networks with e-mail traffic, use a person’s …