Mining in a data-flow environment: Experience in intrusion detection. submitted for publication (1999)

by W Lee, S J Stolfo, K W Mok