How Much Training Data is Enough? A Case Study for HTTP Anomaly-Based Intrusion Detection | Publicación