Intrusion and anomaly detection in trusted systems | IEEE Conference Publication | IEEE Xplore