Abendroth, Jörg2006-08-172006-08-172006-08-17http://hdl.handle.net/2003/2279510.17877/DE290R-8682enIntrusion Detection004New Intrusion Detection Strategies by the use of Partial Outsourcingconference contribution