1. Salem, A., Tang, J., Liu, H.: Feature selection for clustering: a review. In: Data Clustering: Algorithms and Applications, pp. 29–60. CRC Press (2013)
2. Aha, D., Kibler, D., Albert, M.: Instance-based learning algorithms. Mach. Learn. 6(1), 37–66 (1991)
3. Ahmed, M., Mahmood, A., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19–31 (2016)
4. Alazab, A., Hobbs, M., Abawajy, J., Alazab, M.: Using feature selection for intrusion detection system. In: ISCIT, pp. 296–301. IEEE (2012)
5. Avila, R., Khoury, R., Khoury, R., Petrillo, F.: Use of security logs for data leak detection: a systematic literature review. Secur. Commun. Netw. 2021(1), 29 (2021)