Using artificial anomalies to detect unknown and known network intrusionsWei FanMatthew Milleret al.2001ICDM 2001