Review Article

A Closer Look at Intrusion Detection System for Web Applications

Figure 4

Working of the user verifier module.