[1]
I. Adamu, A. S. Ahmadu, U. J. Guli, and P. Ezekiel, “Comparison and Analysis of Data Mining Techniques for Intrusion Detection”, AJASTR, vol. 11, no. 1, pp. 26–42, Jul. 2023.