Conversion methods for symbolic features: A comparison applied to an intrusion detection problem | Publicación