Description: Anomaly Detection in Database Systems, Common Intrusion Detection Framework, Intrusion Detection and Isolation Protocol / IDIP, Intrusion Detection for Large Networks, Misuse Detection and Workshop for Intrusion Detection and Response Data Sharing.