Review Article

A Closer Look at Intrusion Detection System for Web Applications

Figure 5

Working of the access controller module.