related documents Using Bipartite Anomaly Features for Cyber Security Applications Conference Proceeding