Human immune anomaly and misuse based detection for computer system operations: part II | IEEE Conference Publication | IEEE Xplore