Return to Article Details Using anomaly detection method to detect network attacks Download Download PDF