Return to Article Details Survey of Bio-Inspired Techniques based on System Resource Usage in Intrusion Detection Download Download PDF