[1]
“A Survey and Comparative Study of Different Data Mining Techniques for Implementation of Intrusion Detection System”, Int. J. Curr. Eng. Technol., vol. 4, no. 3, pp. 1288–1291, Jun. 2014, Accessed: Apr. 05, 2026. [Online]. Available: https://ijcet.evegenis.org/index.php/ijcet/article/view/700