[1]
H. K. Shaikha and W. M. Abduallah, “A Review of Intrusion Detection Systems”, ACAD J NAWROZ UNIV, vol. 6, no. 3, pp. 101–105, Aug. 2017.