Return to Article Details Influence of pre-processing on anomaly-based intrusion detection Download Download PDF