Intrusion detection in a private network by satisfying constraints | IEEE Conference Publication | IEEE Xplore