1. Alanazi, H.O., Noor, R.M., Zaidan, B.B., Zaidan, A.A.: Intrusion Detection System: Overview. Journal of Computing 2(2) (February 2010)
2. Farid, D.M., Dormont, J., Harbi, N., Hoa, N.H., Rahman, M.Z.: Adaptive Network Intrusion Detection Learning: Attribute Selection and Classification. In: International Conference on computer Systems Engineering, Version 1 (July 2010)
3. Mulay, S.A., Devale, P.R., Garje, G.V.: Intrusion Detection System using Support Vector Machine and Decision Tree. International Journal of Computer Applications (0975-8887) 3(3), 40–43 (2010)
4. Pan, Z.-s.’., Chen, S., Hu, G.-b., Zhang, D.-q.: Hybrid Neural Network and C4.5 for Misuse Detection. In: Proceedings of the Second IEEE International Conference on Machine Learning and Cybernetics, November 2003, pp. 2–5 (2003)
5. Yang, C., Ge, H., Yao, G., Ma, L.: Quick Complete Attribute Reduction Algorithm. In: IEEE Sixth International Conference On Fuzzy Systems And Knowledge Discovery (2009)