Archive > Volume 25 Issue 10 > 2002,25(10):128-131135. DOI:10.11835/j.issn.1000-582X.2002.10.035 CSTR:[cstr] Prev Next

Intrusion Detection Based on Data Mining