Intrusion Signatures and Analysis by Mark Cooper, Karen Frederick & Matt Fearnow