[1]
Priya, R.S. et al. 2014. Intrusion Detection and Violation of Compliance by Monitoring the Network. International Journal of Computer Sciences and Engineering. 2, 3 (Mar. 2014), 84–91.