[1]
“A Review of Intrusion Detection System: Methodology, Classification ”, IJLTEMAS, vol. 14, no. 4, pp. 366–373, May 2025, doi: 10.51583/IJLTEMAS.2025.140400039.