An immunity-based technique to characterize intrusions in computer networks | IEEE Journals & Magazine | IEEE Xplore