[1]
K. S. E. P. M. W., “Study of Tree Base Data Mining Algorithms for Network Intrusion Detection”, IJRITCC, vol. 2, no. 10, pp. 3253–3257, Oct. 2014.