Intrusion Detection Systems; Anomaly Detection Systems; Multiple-Detector Systems; Boolean Combination; Pruning Techniques