1. Anderson, J.P.: Computer security threat monitoring and surveillance. Tech. Rep. James P Anderson Co Fort Washingt. Pa. 56 (1980).
2. Bouzida, Y., Cuppens, F.: Neural networks vs. decision trees for intrusion detection. Commun. 2006. ICC ’06. IEEE Int. Conf. 2394–2400 (2006).
3. Cataltepe, Z. et al.: Online feature selected semi-supervised decision trees for network intrusion detection. Proc. NOMS 2016 - 2016 IEEE/IFIP Netw. Oper. Manag. Symp. AnNet, 1085–1088 (2016).
4. Denning, D.E.: An Intrusion-Detection Model. IEEE Trans. Softw. Eng. SE-13, 2, 222–232 (1987).
5. Depren, O. et al.: An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert Syst. Appl. 29, 4, 713–722 (2005).