1. Aksoy S (2008) Feature reduction and selection. Department of Computer Engineering, Bilkent University, CS 551
2. Al-mamory SO, Jassim FS (2013) Evaluation of different data mining algorithms with KDD CUP 99 data set. J Babylon Univ Pure Appl Sci 21(8):2663–2681
3. Amrita MA (2013) Performance analysis of different feature selection methods in intrusion detection. Int J Sci Technol Res 2(6):225–231
4. Atefi K, Yahya S, Dak AY, Atefi A (2013) A hybrid intrusion detection system based on different machine learning algorithms. In: Proceedings of the 4th international conference on computing and informatics, Sarawak, Malaysia. pp 312–320
5. Bin Y, Qiao Y, Xin XW et al (2002) Anomaly intrusion detection method based on HMM[J]. IEEE Electron Lett 38:663–664