Tsai, Y., Wang, C., Chang, Y., & Tong, L. Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model. Wiley.
Chicago Style (17th ed.) CitationTsai, Ying-Ti, Chung-Ho Wang, Yung-Chia Chang, and Lee-Ing Tong. Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model. Wiley.
MLA (9th ed.) CitationTsai, Ying-Ti, et al. Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model. Wiley.
Warning: These citations may not always be 100% accurate.