1. Bhuyan, M., Bhattacharyya, D., & Kalita, J. (2013) Network anomaly detection: Methods, systems and tools. IEEE Communication Surveys and Tutorials, 16(1), 1–34.
2. Blum, A. L., & Langley, P. (1997). Selection of relevant features and examples in machine learning. Artificial Intelligence, 97(1–2), 245–271.
3. Chapelle, O., Vapnik, V., Bousquet, O., & Mukherjee, S. (2002). Choosing multiple parameters for support vector machines. Machine Learning, 46(1–3), 131–159.
4. Chebrolu, S., Abraham, A., & Thomas, J. P. (2005). Feature deduction and ensemble design of intrusion detection systems. Computers & Security, 24(4), 295–307.
5. Claise, B., Trammell, B., & Aitken, P. (2013). Specification of the IP Flow Information Export (IPFIX) protocol for the exchange of flow information. In RFC 7011 (INTERNET STANDARD). http://www.ietf.org/rfc/rfc7011.txt .