Return to Article Details Analysis of the Effectiveness of Several Intrusion Detection Methods that Use Supervised Machine Learning Download Download PDF