B.: A method to detect intrusive activity in a networked environment (1991)

by L T Heberlein, K N Levitt, Mukherjee
Venue:Proc. of the 14th National Computer Security Conference