[1]
H. kaur, “NETWORK INTRUSION DETECTION AND PREVENTION ATTACKS”,
IJCT
, vol. 2, no. 3, pp. 21–23, Jun. 2012.