Intrusion detection using fuzzy association rules

Intrusion detection using fuzzy association rules
-

doi
Article type
Journal