[1]
S. Chandran and K. Senthil Kumar, “A survey of intrusion detection techniques”, IJET, vol. 7, no. 2.4, pp. 187–189, Mar. 2018, doi: 10.14419/ijet.v7i2.4.13036.