These reports were originally published in the ;login: Special Issue on Intrusion Detection, September, 1999.
Our thanks to the summarizers:
David Parter Ryan Donnelly