Cite This Page
Bibliographic details for The Use Of Artificial Intelligence Based Strategies For Intrusion Detection: A Evaluation
- Page name: The Use Of Artificial Intelligence Based Strategies For Intrusion Detection: A Evaluation
- Author: jenny3dprint opensource contributors
- Publisher: jenny3dprint opensource, .
- Date of last revision: 16 September 2021 19:33 UTC
- Date retrieved: 16 June 2024 13:23 UTC
- Permanent URL: http://wiki.jenny3dprint.com/index.php?title=The_Use_Of_Artificial_Intelligence_Based_Strategies_For_Intrusion_Detection:_A_Evaluation&oldid=547
- Page Version ID: 547
Citation styles for The Use Of Artificial Intelligence Based Strategies For Intrusion Detection: A Evaluation
APA style
The Use Of Artificial Intelligence Based Strategies For Intrusion Detection: A Evaluation. (2021, September 16). jenny3dprint opensource, . Retrieved 13:23, June 16, 2024 from http://wiki.jenny3dprint.com/index.php?title=The_Use_Of_Artificial_Intelligence_Based_Strategies_For_Intrusion_Detection:_A_Evaluation&oldid=547.
MLA style
"The Use Of Artificial Intelligence Based Strategies For Intrusion Detection: A Evaluation." jenny3dprint opensource, . 16 Sep 2021, 19:33 UTC. 16 Jun 2024, 13:23 <http://wiki.jenny3dprint.com/index.php?title=The_Use_Of_Artificial_Intelligence_Based_Strategies_For_Intrusion_Detection:_A_Evaluation&oldid=547>.
MHRA style
jenny3dprint opensource contributors, 'The Use Of Artificial Intelligence Based Strategies For Intrusion Detection: A Evaluation', jenny3dprint opensource, , 16 September 2021, 19:33 UTC, <http://wiki.jenny3dprint.com/index.php?title=The_Use_Of_Artificial_Intelligence_Based_Strategies_For_Intrusion_Detection:_A_Evaluation&oldid=547> [accessed 16 June 2024]
Chicago style
jenny3dprint opensource contributors, "The Use Of Artificial Intelligence Based Strategies For Intrusion Detection: A Evaluation," jenny3dprint opensource, , http://wiki.jenny3dprint.com/index.php?title=The_Use_Of_Artificial_Intelligence_Based_Strategies_For_Intrusion_Detection:_A_Evaluation&oldid=547 (accessed June 16, 2024).
CBE/CSE style
jenny3dprint opensource contributors. The Use Of Artificial Intelligence Based Strategies For Intrusion Detection: A Evaluation [Internet]. jenny3dprint opensource, ; 2021 Sep 16, 19:33 UTC [cited 2024 Jun 16]. Available from: http://wiki.jenny3dprint.com/index.php?title=The_Use_Of_Artificial_Intelligence_Based_Strategies_For_Intrusion_Detection:_A_Evaluation&oldid=547.
Bluebook style
The Use Of Artificial Intelligence Based Strategies For Intrusion Detection: A Evaluation, http://wiki.jenny3dprint.com/index.php?title=The_Use_Of_Artificial_Intelligence_Based_Strategies_For_Intrusion_Detection:_A_Evaluation&oldid=547 (last visited June 16, 2024).
BibTeX entry
@misc{ wiki:xxx, author = "jenny3dprint opensource", title = "The Use Of Artificial Intelligence Based Strategies For Intrusion Detection: A Evaluation --- jenny3dprint opensource{,} ", year = "2021", url = "http://wiki.jenny3dprint.com/index.php?title=The_Use_Of_Artificial_Intelligence_Based_Strategies_For_Intrusion_Detection:_A_Evaluation&oldid=547", note = "[Online; accessed 16-June-2024]" }
When using the LaTeX package url (\usepackage{url}
somewhere in the preamble) which tends to give much more nicely formatted web addresses, the following may be preferred:
@misc{ wiki:xxx, author = "jenny3dprint opensource", title = "The Use Of Artificial Intelligence Based Strategies For Intrusion Detection: A Evaluation --- jenny3dprint opensource{,} ", year = "2021", url = "\url{http://wiki.jenny3dprint.com/index.php?title=The_Use_Of_Artificial_Intelligence_Based_Strategies_For_Intrusion_Detection:_A_Evaluation&oldid=547}", note = "[Online; accessed 16-June-2024]" }