Return to Article Details Framework for detecting outlier and database intrusions Download Download PDF