Return to Issue Details A Survey and Comparative Study of Different Data Mining Techniques for Implementation of Intrusion Detection System Download Download PDF