1. Agrawal, D., Agrawal, C.: A review on various methods of intrusion detection system. Comput. Eng. Intell. Syst. 11(1), 7–15 (2020)
2. Almgren, M., Jonsson, E.: Using active learning in intrusion detection. In: CSFW, pp. 88–98. IEEE (2004)
3. Amanowicz, M., Jankowski, D.: Detection and classification of malicious flows in software-defined networks using data mining techniques. Sensors 21(9), 2972 (2021)
4. Amazon: How xgboost works. https://docs.aws.amazon.com/sagemaker/latest/dg/xgboost-HowItWorks.html. Accessed 21 June 2021
5. Studies in Computational Intelligence;OJ Awujoola,2021