1.
A. Peda Gopi, V. Lakshman Narayana, B. Naga Sudheer, K. Chaitanya. Intrusion Detection Methodology using Efficient Data Mining Techniques. IJAST [Internet]. 2020Mar.30 [cited 2026Apr.13];29(3):9471 -9477. Available from: https://sersc.org/journals/index.php/IJAST/article/view/26721