Research Article | ||||||||||||||||||||||||||||||
. 2023; 11(2): 135-141 Performance Analysis of Machine Learning Techniques for Intrusion Detection SRAVANI ANUSHA G, D SRINIVAS.
|
How to Cite this Article |
Pubmed Style SRAVANI ANUSHA G, D SRINIVAS. Performance Analysis of Machine Learning Techniques for Intrusion Detection. . 2023; 11(2): 135-141. doi:10.31838/ijccts/11.02.17 Web Style SRAVANI ANUSHA G, D SRINIVAS. Performance Analysis of Machine Learning Techniques for Intrusion Detection. https://www.ijccts.org/?mno=144835 [Access: February 28, 2023]. doi:10.31838/ijccts/11.02.17 AMA (American Medical Association) Style SRAVANI ANUSHA G, D SRINIVAS. Performance Analysis of Machine Learning Techniques for Intrusion Detection. . 2023; 11(2): 135-141. doi:10.31838/ijccts/11.02.17 Vancouver/ICMJE Style SRAVANI ANUSHA G, D SRINIVAS. Performance Analysis of Machine Learning Techniques for Intrusion Detection. . (2023), [cited February 28, 2023]; 11(2): 135-141. doi:10.31838/ijccts/11.02.17 Harvard Style SRAVANI ANUSHA G, D SRINIVAS (2023) Performance Analysis of Machine Learning Techniques for Intrusion Detection. , 11 (2), 135-141. doi:10.31838/ijccts/11.02.17 Turabian Style SRAVANI ANUSHA G, D SRINIVAS. 2023. Performance Analysis of Machine Learning Techniques for Intrusion Detection. International Journal of Communication and Computer Technologies, 11 (2), 135-141. doi:10.31838/ijccts/11.02.17 Chicago Style SRAVANI ANUSHA G, D SRINIVAS. "Performance Analysis of Machine Learning Techniques for Intrusion Detection." International Journal of Communication and Computer Technologies 11 (2023), 135-141. doi:10.31838/ijccts/11.02.17 MLA (The Modern Language Association) Style SRAVANI ANUSHA G, D SRINIVAS. "Performance Analysis of Machine Learning Techniques for Intrusion Detection." International Journal of Communication and Computer Technologies 11.2 (2023), 135-141. Print. doi:10.31838/ijccts/11.02.17 APA (American Psychological Association) Style SRAVANI ANUSHA G, D SRINIVAS (2023) Performance Analysis of Machine Learning Techniques for Intrusion Detection. International Journal of Communication and Computer Technologies, 11 (2), 135-141. doi:10.31838/ijccts/11.02.17 |