Return to Article Details Comparison of intrusion detection system based on feature extraction Download Download PDF