Return to Article Details New Technologies for Detecting and Comparing Computer Attacks