Return to Article Details Investigation of computer systems to detect intrusions and network anomalies Download Download PDF