Using artificial anomalies to detect unknown and known network intrusions | IEEE Conference Publication | IEEE Xplore