Return to Article Details An optimized model for network intrusion detection in the network operating system environment Download Download PDF