1. Kotsiantis, Sotiris, Dimitris Kanellopoulos, and Panayiotis Pintelas. “Handling imbalanced datasets: A review.” GESTS International Transactions on Computer Science and Engineering 30.1 (2006): 25–36. doi:10.1.1.96.9248.
2. McHugh, John, Alan Christie, and Julia Allen. “Defending yourself: The role of intrusion detection systems.” IEEE software 17.5 (2000): 42–51. doi:10.1109/52.877859.
3. Surana, Shraddha. “Intrusion Detection using Fuzzy Clustering and Artificial Neural Network.” Advances in Neural Networks, Fuzzy Systems and Artificial Intelligence. (2014): 209–217.
4. Dokas, Paul, LeventErtoz, Vipin Kumar, Aleksandar Lazarevic, Jaideep Srivastava, and Pang-Ning Tan. “Data mining for network intrusion detection.” Proc. NSF Workshop on Next Generation Data Mining. (2002): 21–30.
5. Mulay, Snehal A., P. R. Devale, and G. V. Garje. “Intrusion detection system using support vector machine and decision tree.” International Journal of Computer Applications 3.3 (2010): 40–43.