Return to Article Details Analyzing Temporal Dependency Structures in Cyber security: A Case Study of Network Traffic Anomalies Download Download PDF