1. Buczak A, Guven E (2017) IEEE Commun Surv Tutorials 18(2):1153–1176A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection[J]
2. Tao Duan Y, Tian H, Zhang Y, Liu Q, Li J, Jiang (2020) Zongsheng Shi. IEEE Access 8:78330–78342Intelligent Processing of Intrusion Detection Data[J]
3. Mohamed Touahria. Feature Selection Algorithms in Intrusion Detection System: A Survey[J];Maza S;KSII Trans Internet Inf Syst,2018
4. Security for cyberspace: challenges and opportunities[J];Jiang-xing Wu Jian-hua;Front Inf Technol Electron Eng,2018
5. Mehmood T, Rais H (2016). SVM for network anomaly detection using ACO feature subset[C]// 2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC). IEEE,