1. A Data Mining Approach to Network Intrusion Detection;A. O.Adetunmbi;Journal of Computer Science & Its Applications,2007
2. Adetunmbi, A. O., Falaki, S. O., Adewale, O. S., & Alese, B. K. (2007). A Rough Set Approach for Detecting known and novel Network intrusion. In Second International Conference on Application of Information and Communication Technologies to Teaching, Research and Administrations (AICTTRA, 2007). Research Gate.
3. Intrusion Detection based on Rough Set and k-Nearest Neighbour;A. O.Adetunmbi;International Journal of Computing and ICT Research,2008
4. Aickelin, U. (2020). Julie Green smith, Jamie Twycross. Immune System Approaches to Intrusion Detection - A Review. http://eprints.nottingham.ac.uk/619/1/04icaris_ids review.pdf
5. Ajith, A., Ravi, J., Johnson, T., & Sang, Y.H. (2005). D-SCIDS: Distributed soft computing intrusion detection system. Journal of Network and Computer Applications.