1.
Detecting Threats in IDS using Data Mining Techniques. Int. J. Curr. Eng. Technol. 2014;4(2):798-801. Accessed April 13, 2026. https://ijcet.evegenis.org/index.php/ijcet/article/view/617