Return to Article Details Methodology for detecting network intrusions and signs of computer attacks based on an empirical approach Download Download PDF