Return to Article Details Implementation of the Decision Tree Method for Detecting Attacks in Networks Download Download PDF