1. Lee W, Stolfo SJ (1998) Data mining approaches for intrusion detection. In: Proc. of the 1998 USENIX Security Symp
2. Bishop CM (2006) Pattern recognition and machine learning. Springer, New York
3. Quinlan RJ (1993) C4.5: programs for machine learning. Morgan Kaufmann Publishers Inc, Burlington
4. Katagiri H, Hirasawa K, Hu J, Murata J (2001) Network structure oriented evolutionary model—genetic network programming. In: Proc. of genetic and evolutionary computation conference, pp 219–226
5. Holland JH (1975) Adaptation in natural and artificial systems. University of Michigan Press, Ann Arbor