Return to Article Details A Hybrid Model for Detecting Intrusions on Network Logs Download Download PDF