1. Aha, D. W. (1991). Case-based learning algorithms. In Proceedings of Case-Based Reasoning Workshop, (pp. 147–158). Academic Press.
2. Ahmad, I., Swati, S. U., & Mohsin, S. (2007). Intrusions detection mechanism by resilient back propagation (rprop). European Journal of Scientific Research, 17(4), 523-531.
3. Ambwani, T. (2003). Multi class support vector machine implementation to intrusion detection. IEEE, 2300-2305.
4. Andrew, H. S., & Mukkamala, S. (2003). Identifying important features for intrusion detection using support vector machines and neural networks. In Proceedings ofSymposium on Applications and the Internet (SAINT’03). SAINT.