[1]
“Analyzing Soft Computing based Intrusion Detection Systems”, IJARCS, vol. 2, no. 2, pp. 275–278, Jan. 2017, doi: 10.26483/ijarcs.v2i2.403.