[1]
“Detecting Threats in IDS using Data Mining Techniques”, Int. J. Curr. Eng. Technol., vol. 4, no. 2, pp. 798–801, Apr. 2014, Accessed: Apr. 08, 2026. [Online]. Available: https://ijcet.evegenis.org/index.php/ijcet/article/view/617