1. Salama MA, Eid HF, Ramadan RA, Darwish A, Hassanien AE (2011) Hybrid intelligent intrusion detection scheme. Adv Intell Soft Comput. https://doi.org/10.1007/978-3-642-20505-7_26
2. W. Stallings and L. Brown, (2015) Computer Security: Principles and Practice, Global Edition. Pearson Higher Ed
3. Maruyama, T., Hirose, T., & Konagaya, A. (1993). A fine-grained parallel genetic algorithm for distributed parallel systems. In: 1993 Proceedings of the 5th International Conference on Genetic Algorithms (pp 184–190). San Francisco, CA, USA: Morgan Kaufmann Publishers Inc. Retrieved from http://dl.acm.org/citation.cfm? id=645513.657765 (accessed Feb. 12, 2021)
4. Jiang S, Chin K-S, Wang L, Qu G, Tsui KL (2017) Modified genetic algorithm-based feature selection combined with pre-trained deep neural network for demand forecasting in outpatient department. Expert Syst Appl 82:216–230. https://doi.org/10.1016/j.eswa.2017.04.017
5. M. Mitchell, An Introduction to Genetic Algorithms. MIT Press, 1998.