Return to Article Details Processing Intrusion Data with Machine Learning and MapReduce Download Download PDF