Return to Issue Details Using An Improved Data Reduction Method in Intrusion detection system Download Download PDF