Return to Article Details A Comparative Study of Perceiving Intrusion Using Data Mining Techniques Download Download PDF