Return to Article Details A Data Mining Approach for Intrusion Detection in a Computer Network Download Download PDF