Constructing attribute weights from computer audit data for effective intrusion detection

Abstract
No abstract available