Return to Article Details Rule-Based Intrusion Detection System Using Logical Analysis Of Data Download Download PDF