[1]
Gagan Deep Sharma and Vivek Kumar, “Towards Configured Intrusion Detection Systems”, GJCST, vol. 16, no. E4, pp. 1–10, Mar. 2016.