[1]
A. Peda Gopi, V. Lakshman Narayana, B. Naga Sudheer, K. Chaitanya, “Intrusion Detection Methodology using Efficient Data Mining Techniques”, IJAST, vol. 29, no. 3, pp. 9471 - 9477, Mar. 2020.