[1]
“Using An Improved Data Reduction Method in Intrusion detection system”, IJERAT, vol. 3, no. 1, pp. 1–20, Jan. 2017, Accessed: Jan. 10, 2025. [Online]. Available: https://ijerat.com/index.php/ijerat/article/view/194