Return to Article Details Information - Theoretic Methods for Anomaly Detection Download Download PDF