[1]
Kulhare, R. and Singh, D.D. 2013. Survey paper on intrusion detection techniques. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY. 6, 2 (May 2013), 329–335. DOI:https://doi.org/10.24297/ijct.v6i2.3498.