Return to Article Details Using An Improved Data Reduction Method in Intrusion detection system Download Download PDF