[1]
W. Zhang and J. P. Lazaro, “A Survey on Network Security Traffic Analysis and Anomaly Detection Techniques”, ijetaa, vol. 1, no. 4, pp. 8–16, May 2024, doi: 10.62677/IJETAA.2404117.