[1]
I. T. B. Zamri and J. Juremi, “Review of Network Intrusion Systems Evaluated on NSL-KDD and CIC-IDS2017 Datasets”, JATI, vol. 7, no. 1, Jan. 2026.