1. Yang Z, Liu X, Li T, Wu D, Wang J, Zhao Y, et al. A systematic literature review of methods and datasets for anomaly-based network intrusion detection. Comput Secur [Internet]. 2022;116:102675. Available from: https://www.sciencedirect.com/science/article/pii/S0167404822000736
2. Singh R, Kumar H, Singla RK. An intrusion detection system using network traffic profiling and online sequential extreme learning machine. Expert Syst Appl [Internet]. 2015;42(22):8609–24. Available from: http://www.sciencedirect.com/science/article/pii/S0957417415004753
3. An effective intrusion detection approach using SVM with naïve Bayes feature embedding;Gu J;Comput Secur,2021
4. Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection;Belavagi MC;Procedia Computer Science,2016
5. LR-HIDS: logistic regression host-based intrusion detection system for cloud environments;Besharati E;J Ambient Intell Humaniz Comput,2019