Heuristics for Improved Enterprise Intrusion Detection. by James J. Treinen