-
@lusis There's been some work in that direction for Intrusion Detection, e.g. google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CDwQFjAA&url=http%3A%2F%2Fwww.cs.purdue.edu%2Fhomes%2Fapm%2Flisten%2FJListen-1.0-BITS%2FGopinath%2FMS-thesis%2Fthesis-final.doc&ei=ThUzUr-fGIOm2gXVnoHoCA&usg=AFQjCNFIBece4nsf53Z-Ak6GjsroSXKn_w&bvm=bv.52164340,d.b2I (Word doc, unfortunately)