Intrusion detection using fuzzy association rules

Intrusion detection using fuzzy association rules
-

doi
Date : 1387-10
Article type
Journal