[1]
R. Kulhare and D. D. Singh, “Survey paper on intrusion detection techniques”,
IJCT
, vol. 6, no. 2, pp. 329–335, May 2013.