Return to Article Details Investigation of intrusion in computer systems based on the Hurst exponent Download Download PDF