1.
A. Peda Gopi, V. Lakshman Narayana, B. Naga Sudheer, K. Chaitanya. Intrusion Detection Methodology using Efficient Data Mining Techniques. IJAST [Internet]. 2020Mar.30 [cited 2024May6];29(3):9471 -9477. Available from: http://sersc.org/journals/index.php/IJAST/article/view/26721