1. Yefang, Wu, Z., Guo, L.: Intrusion of the clustering algorithm and implementation, vol. (3), 46–49. Chongqing University (2004)
2. Zhang, A. product, Xu, B.-G.: Chunking support vector clustering to improve in the intrusion detection. Micro-Computer Information 5-3(22), 46–49 (2006)
3. Lin, C., Wang, S.: Fuzzy Support Vector Machines with Automatic Membership Setting. STUDFUZZ, vol. (177), pp. 233–25 (2005)
4. Lei, H., Bin, Z., Zhou, H.: Clustering support vector machines based intrusion detection algorithm. Radio Engineering (39), 45–49 (2009)
5. Zaman, S., Karray, F.: TCP/IP Model and Intrusion Detection Systems. In: International Conference on Advanced Information Networking and Applications Workshops, pp. 90–96 (2009)