[1]
R. S. Priya, V. Anusha, and N. Kumar, “Intrusion Detection and Violation of Compliance by Monitoring the Network”, Int. J. Comp. Sci. Eng., vol. 2, no. 3, pp. 84–91, Mar. 2014.