Bosman, Gregory; Gruner, Stefan
(Springer-Verlag, 2013)
Classical ways of intrusion analysis from textual communication log files are either AI-based (such as by combinations of data mining with various techniques of machine learning), or they are based on regular expressions ...