Return to Article Details Validation of the Intelligence Technique in the detection of cyber attacks Download Download PDF