[1]
“EVOLUTION OF INTRUSION DETECTION: THEORETICAL FOUNDATIONS, SYSTEM ARCHITECTURES, AND REAL- WORLD PRACTICES”, CJSSR, vol. 3, no. 4, pp. 1–30, Oct. 2025, doi: 10.63878/cjssr.v3i4.1376.