1. Koch, R.: Towards next-generation intrusion detection. In: 2011 3rd International Conference on Cyber Conflict (ICCC), pp. 1–18 (2011)
2. Barati, M., Abdullah, A., Mahmod, R., Mustapha, N., Udzir, N.I.: Feature selection for IDS in encrypted traffic using genetic algorithm. In: Proceedings of the 4th International Conference on Computing and Informatics, (ICCI 2013), pp. 279–285 (2013)
3. Dyer, K.P., Coull, S.E., Ristenpart, T., Shrimpton, T.: Peek-a-Boo, i still see you: why efficient traffic analysis countermeasures fail. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 332–346 (2012)
4. Sperotto, A., Schaffrath, G., Sadre, R., Morariu, C., Pras, A., Stiller, B.: An overview of IP flow-based intrusion detection. IEEE Commun. Surv. Tutor. 12(3), 343–356 (2010)
5. Engen, V.: Machine learning for network based intrusion detection. Bournemouth University (2010)