1. S. Mukkamala, J. Guadalupe, A. Sung. Intrusion detection using neural networks and support vector machines. In Proceedings of the International Joint Conference on Neural Networks, IEEE, Honolulu, HI, USA, vol. 2, pp. 1702–1707, 2002.
2. S. Owais, V. Snasel, P. Kromer, A. Abraham. Survey: Using genetic algorithm approach in intrusion detection systems techniques. In Proceedings of the 7th Computer Information Systems and Industrial Management Applications, IEEE, Ostrava, USA, pp. 300–307, 2008.
3. D. J. Day, Z. X. Zhao. Protecting against address space layout randomisation (ASLR) compromises and return-to-libc attacks using network intrusion detection systems. International Journal of Automation and Computing, vol. 8, no. 4, pp. 472–483, 2011.
4. M. Arun, A. Krishnan. Functional verification of signature detection architectures for high speed network applications. International Journal of Automation and Computing, vol.9, no. 4, pp. 395–402, 2012.
5. J. Gomez, D. Dasgupta. Evolving fuzzy classifiers for intrusion detection. In Proceedings of 2002 IEEE Workshop on Information Assurance, IEEE, West Point, NY, USA, pp. 321–323, 2002.