[1]
“Decision Tree based counter measures for Host-based IDS in Encrypted Network: A General Survey”, Int. J. Curr. Eng. Technol., vol. 4, no. 1, pp. 77–79, Feb. 2014, Accessed: Mar. 14, 2026. [Online]. Available: https://ijcet.evegenis.org/index.php/ijcet/article/view/449