Cite This Page
Bibliographic details for The Use Of Artificial Intelligence Primarily Based Methods For Intrusion Detection: A Review
- Page name: The Use Of Artificial Intelligence Primarily Based Methods For Intrusion Detection: A Review
- Author: jenny3dprint opensource contributors
- Publisher: jenny3dprint opensource, .
- Date of last revision: 17 September 2021 16:07 UTC
- Date retrieved: 2 June 2024 01:32 UTC
- Permanent URL: http://wiki.jenny3dprint.com/index.php?title=The_Use_Of_Artificial_Intelligence_Primarily_Based_Methods_For_Intrusion_Detection:_A_Review&oldid=889
- Page Version ID: 889
Citation styles for The Use Of Artificial Intelligence Primarily Based Methods For Intrusion Detection: A Review
APA style
The Use Of Artificial Intelligence Primarily Based Methods For Intrusion Detection: A Review. (2021, September 17). jenny3dprint opensource, . Retrieved 01:32, June 2, 2024 from http://wiki.jenny3dprint.com/index.php?title=The_Use_Of_Artificial_Intelligence_Primarily_Based_Methods_For_Intrusion_Detection:_A_Review&oldid=889.
MLA style
"The Use Of Artificial Intelligence Primarily Based Methods For Intrusion Detection: A Review." jenny3dprint opensource, . 17 Sep 2021, 16:07 UTC. 2 Jun 2024, 01:32 <http://wiki.jenny3dprint.com/index.php?title=The_Use_Of_Artificial_Intelligence_Primarily_Based_Methods_For_Intrusion_Detection:_A_Review&oldid=889>.
MHRA style
jenny3dprint opensource contributors, 'The Use Of Artificial Intelligence Primarily Based Methods For Intrusion Detection: A Review', jenny3dprint opensource, , 17 September 2021, 16:07 UTC, <http://wiki.jenny3dprint.com/index.php?title=The_Use_Of_Artificial_Intelligence_Primarily_Based_Methods_For_Intrusion_Detection:_A_Review&oldid=889> [accessed 2 June 2024]
Chicago style
jenny3dprint opensource contributors, "The Use Of Artificial Intelligence Primarily Based Methods For Intrusion Detection: A Review," jenny3dprint opensource, , http://wiki.jenny3dprint.com/index.php?title=The_Use_Of_Artificial_Intelligence_Primarily_Based_Methods_For_Intrusion_Detection:_A_Review&oldid=889 (accessed June 2, 2024).
CBE/CSE style
jenny3dprint opensource contributors. The Use Of Artificial Intelligence Primarily Based Methods For Intrusion Detection: A Review [Internet]. jenny3dprint opensource, ; 2021 Sep 17, 16:07 UTC [cited 2024 Jun 2]. Available from: http://wiki.jenny3dprint.com/index.php?title=The_Use_Of_Artificial_Intelligence_Primarily_Based_Methods_For_Intrusion_Detection:_A_Review&oldid=889.
Bluebook style
The Use Of Artificial Intelligence Primarily Based Methods For Intrusion Detection: A Review, http://wiki.jenny3dprint.com/index.php?title=The_Use_Of_Artificial_Intelligence_Primarily_Based_Methods_For_Intrusion_Detection:_A_Review&oldid=889 (last visited June 2, 2024).
BibTeX entry
@misc{ wiki:xxx, author = "jenny3dprint opensource", title = "The Use Of Artificial Intelligence Primarily Based Methods For Intrusion Detection: A Review --- jenny3dprint opensource{,} ", year = "2021", url = "http://wiki.jenny3dprint.com/index.php?title=The_Use_Of_Artificial_Intelligence_Primarily_Based_Methods_For_Intrusion_Detection:_A_Review&oldid=889", note = "[Online; accessed 2-June-2024]" }
When using the LaTeX package url (\usepackage{url}
somewhere in the preamble) which tends to give much more nicely formatted web addresses, the following may be preferred:
@misc{ wiki:xxx, author = "jenny3dprint opensource", title = "The Use Of Artificial Intelligence Primarily Based Methods For Intrusion Detection: A Review --- jenny3dprint opensource{,} ", year = "2021", url = "\url{http://wiki.jenny3dprint.com/index.php?title=The_Use_Of_Artificial_Intelligence_Primarily_Based_Methods_For_Intrusion_Detection:_A_Review&oldid=889}", note = "[Online; accessed 2-June-2024]" }