Return to Article Details An Effective Approach for Improving Anomaly Intrusion Detection Download Download PDF