1. Prem Sankar AU, Poornachandran P, Ashok A, Manu RK, Hrudya P (2017) B-secure: a dynamic reputation system for identifying anomalous BGP paths. Adv Intell Syst Comput 515:767–775
2. Sankaran S, Sridhar R (2015) Modeling and analysis of routing for IoT networks. In: International conference on computing and network communications (CoCoNet). IEEE, Trivandrum, India
3. Hindy H, Brosset D, Bayne E, Seeam A, Tachtatzis C, Atkinson R, Bellekens X A Taxonomy and survey pf intrusion detection system, design techniques, network threats and datasets
4. Vijayarani1 S, Sylviaa M Assistant Professor and M. Phil Research Scholar from the Department of Computer Science Intrusion detection system a study. Bharathiar University, Coimbatore
5. Paliwal S, Gupta R (2012) Denial-of-service, probing remote to user (R2L) attack detection using genetic algorithm. Int J Comput Appl