[1]
R. Kulhare and D. D. Singh, “Survey paper on intrusion detection techniques”, IJCT, vol. 6, no. 2, pp. 329–335, May 2013.