Return to Article Details The Parallel Coordinates Methodology to Study Suspicious Behavior on a Computer Network Download Download PDF