1. Adnan M, Abdulazeez B, Adel SI (2011) Intrusion detection and attack classifier based on three techniques. Comp Study Eng Technol J 29(2):233–254
2. Gao M, Zhang K, Lu J (2006) Efficient packet matching for gigabit network intrusion detection using TCAMs. In: Proceedings of 20th international conference on advanced information networking and applications (AINA’06), pp 249–254
3. Myung S, Hun K, Seong H, Seung C, James H (2004) A flow-based method for abnormal network traffic detection. In: IEEE/IFIP network operations and management symposium, pp 599–612
4. Song B, Yang W, Chen M, Zhao X, Fan J (2010) Achieving flow-level controllability in network intrusion detection system. In: 11th ACIS international conference on software engineering, artificial intelligence, networking and parallel/distributed computing, IEEE computer Society
5. Alaidaros H, Mahmuddin M, Al Mazari A (2011) An overview of flow-based and packet-based intrusion detection performance in high speed networks. In: The international arab conference on information technology (ACIT’2011)