[1]
H. kaur, “NETWORK INTRUSION DETECTION AND PREVENTION ATTACKS”, IJCT, vol. 2, no. 3, pp. 21–23, Jun. 2012.