1. James, P.: Anderson: Computer Security Threat Monitoring and Surveillance. Technical Report, Fort Washington, PA, USA (1980)
2. Denning, D.E.: An intrusion-detection model. IEEE Trans Softw. Eng. SE–13(2), 222–232 (1987)
3. Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of self for Unix processes. In: Proceedings 1996 IEEE Symposium on Security and Privacy. pp. 120–128. IEEE Comput. Soc. Press, Oakland, CA, USA (1996)
4. Feng, W., Zhang, Q., Hu, G., Huang, J.X.: Mining network data for intrusion detection through combining SVMs with ant colony networks. Future Gener. Comput. Syst. 37, 127–140 (2014)
5. Kuang, F., Xu, W., Zhang, S.: A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl. Soft Comput. J. 18(C), 178–184 (2014)