Conversion methods for symbolic features: A comparison applied to an intrusion detection problem

Conversion methods for symbolic features: A comparison applied to an intrusion detection problem