1. Enache AC, Patriciu V (2014) Applied computational intelligence and informatics (SACI). In: 2014 IEEE 9th international symposium on SACI 2014, pp 153–158. doi: 10.1109/SACI.2014.6840052
2. Jeya PG, Ravichandran M, Ravichandran CS (2012) Efficient classifier for R2L and U2R attacks. Int J Comput Appl 45(21):29
3. Hou Y, Zheng XF (2011) In: Proceedings of the third international conference on artificial intelligence and computational intelligence—volume part III, AICI’11. Springer, Berlin, pp 340–345
4. Huang J, Liu J (2012) In: 2012 IEEE fifth international conference on advanced computational intelligence (ICACI), pp 188–190
5. Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) In: Proceedings of the second IEEE symposium on computational intelligence for security and defence applications 2009