1P.T. Tich, C. Longbing, T. Dat, D.N. Cuong, Novel intrusion detection using probabilistic neural network and adaptive boosting, International Journal of Computer Science and Information Security 6 (2009).
2M. Sammany, M. Sharawi, M. EI-Beltagy, I. Saroit, Artificial Neural Networks Architecture for Intrusion Detection Systems and Classification of Attacks, Cairo University, available online at: http://infos2007. fci.cu. edu.eg/Computational%20Intelligence/07177.pdf, 2007,.
3L. Liang-Bin, C. Ray-I, K. Jen-Shiang, Detecting network intrusions using signal processing with query-based sampling filter, EURASIP Journal on Advances in Signal Processing (2009).
4X.W. Shelly, B. Wolfgang, The use of computational intelligence in intrusion detection systems: a review, Applied Soft Computing 10 (2010) 1-35.
5L.I. Yan-Heng, T Da-Xin, W. Ai-Min, Annids: intrusion detection system based on artificial neural network, in:Proceedings of the Second International Conference on Machine Learning and Cybernetics, Xi'an, 2003.
6J. Cannady, Artificial neural networks for misuse detection, in: Proceedings of the 1998 National Information Systems Security Conference, Arlington, VA, 1998.
7A. Morteza, J. Rasool, R.S. Hamid, RT-UNNID: a practical solution to real-time network-based intrusion detection using unsupervised neural networks, Computers & Security 25 (2006) 459-468.
8A. Grediaga, F. Ibarra, F. Garcia, B. Ledesma, F. Brotons, Application of Neural Networks in Network Control and Information Security, LNCS, Springer, Heidelberg, 2006, pp. 208-213.
9R.C. Chen, K.F. Cheng, C.F. Hsieh, Using rough set and support vector machine for network intrusion detection, International Journal of Network Security & Its Applications 1 (2009).
10D. Ozgur, T. Murat, A. Emin, C. Kemal, An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks, Expert Systems with Applications 29 (2005) 713-722.