“…Wireless traffic analysis systems and Intrusion Detection Systems have a long and rich history [2,4,6,11,12,16,23,25,26,29,33,35,39,48,55,58]. Generally speaking, wireless traffic analysis systems and Intrusion Detection Systems (IDS) continually monitor computers or networks, collecting data (e.g., system calls, network communication), extracting quantifiable features from this data, and applying a variety of techniques to analyze the data in search of signs of anomalies or compromise.…”