1. Anderson, J.P.: Computer security threat monitoring and surveillance. Technical report, James P. Anderson Co., Fort Washington, PA (1980)
2. Brugger, T.: Kdd cup ’99 dataset (network intrusion) considered harmful. Technical report, Department of Computer Science, UC Davis (2007). https://www.kdnuggets.com/news/2007/n18/4i.html
3. Demir, N., DALKILIÇ, G.: Modified stacking ensemble approach to detect network intrusion. Turkish J. Electr. Eng. Comput. Sci. 26(1), 418–433 (2018)
4. Didaci, L., Giacinto, G., Roli, F.: Ensemble learning for intrusion detection in computer networks. In: Workshop Machine Learning Methods Applications, Siena, Italy (2002)
5. El Farissi, I., Saber, M., Chadli, S., Emharraf, M., Belkasmi, M.G.: The analysis performance of an intrusion detection systems based on neural network. In: 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt), pp. 145–151. IEEE (2016)