1. Goldberg D, Karp B, Ke Y, Nath S, Seshan S (1989) Genetic algorithms in search, optimization, and machine learning. Addison-Wesley, Reading
2. McHugh J (2001) Intrusion and intrusion detection. Int J Inf Secur (IJIS) 1:14–35
3. Wang X, Sang Y, Liu Y, Luo Y (2011) Considerations on security and trust measurement for virtualized environment. J Convergence (JoC) FTRA 2(2):19–24
4. Aikebaier A, Enokido T, Takizawa M (2011) Trustworthy group making algorithm in distributed systems. Human-centric Comput Inf Sci (HCIS) 1:6
5. Nivedita N, Dharaskar RV (2010) An effective approach to network intrusion detection system using genetic algorithm. Int J Comput Appl 1(3):26–32