1. S. Axelsson, "The base-rate fallacy and its implications for the difficulty of intrusion detection," ACM Transactions on Information and System Security (TISSEC), vol. 3, no. 3, pp. 186-205, 2000.
2. R. Sommer and V. Paxson, "Outside the closed world: On using machine learning for network intrusion detection," in Proceedings of the IEEE Symposium on Security and Privacy, 2010, pp. 305-316.
3. M. Alazab, R. Layton, J. J. Li, and S. Venkatraman, "Network intrusion detection systems: A survey and taxonomy," Journal of Network and Computer Applications, vol. 34, no. 4, pp. 1150-1169, 2011.
4. E. A. Hammad, M. A. M. Ahmed, and M. A. Mahmoud, "A review of intrusion detection systems: Concepts, classification and future directions," Journal of Network and Computer Applications, vol. 118, pp. 38-58, 2018.
5. S. S. Kumar and V. P. Sumathi, "Intrusion detection systems: A comprehensive review," in Proceedings of the International Conference on Computing and Network Communications, 2016, pp. 297-303.