Usage of data mining techniques for analyzing network intrusions | IEEE Conference Publication | IEEE Xplore