About Detection of Computer Attacks Using Change-Point Theory | IEEE Conference Publication | IEEE Xplore