[1]
“Using An Improved Data Reduction Method in Intrusion detection system”, IJERAT, vol. 3, no. 1, pp. 1–20, Jan. 2017, Accessed: May 18, 2024. [Online]. Available: https://ijerat.com/index.php/ijerat/article/view/194