1. Chhabra, A., Vashishth, V., Sharma, D.K.: A game theory based secure model against Black hole attacks in Opportunistic Networks. In: Proceedings of 51st Annual Conference on Information Sciences and Systems (CISS), Baltimore, MD, USA (2017)
2. Patel, P.: Geeksforgeeks, https://www.geeksforgeeks.org/intrusion-detection-system-ids/ (2018)
3. NSL-KDD data set: https://nsl.cs.unb.ca/NSL-KDD/ (2013)
4. Crosbie, M., Spafford, E.: Applying genetic programming to intrusion detection. In: AAAI Fall Symposium (1995)
5. W. Lu, I. Traore: Detecting New Forms of Network Intrusion Using Genetic Programming: The 2003 Congress on Evolutionary Computation CEC’03, pp. 2165–2172, Vol.3. Blackwell Publishing, Canberra, Australia (2003)