An Intrusion Detection system was used to analyze events of interest. ... The infected hosts inside the network tried to connect to the internet and thus ...
CMPUT 651: Front to Front Perimeter Search & Pattern Databases. Johnny Huynh. Outline ... Find shortest path a perimeter state. Use a heuristic to find a ...