Return to Article Details POST ANALYSIS OF SNORT INTRUSION FILES USING DATA MINING TECHNIQUES: DECISION TREE AND BAYESIAN NETWORK Download Download PDF