[1]
N. Khamphakdee, N. Benjamas, and S. Saiyod, “Improving Intrusion Detection System Based on Snort Rules for Network Probe Attacks Detection with Association Rules Technique of Data Mining”, J. ICT Res. Appl., vol. 8, no. 3, pp. 234-250, Mar. 2015.