1. Adaptation in Natural and Artificial Systems;Holland,1995
2. A genetic algorithm for solving the inverse problem of support vector machines;Wang;Neurocomputing,2005
3. K. Ahsan, D. Kundur, Practical data hiding in TCP/IP, in: Proceedings of the Workshop on Multimedia Security at ACM Multimedia, 2002, French Riviera, France, 2002, pp. 7–15.
4. Lincoln Laboratory, MIT, “DARPA Intrusion Detection Evaluation,” http://www.ll.mit.edu/IST/ideval/index.html
5. M. Mitchell, An Introduction to Genetic Algorithms, MIT Press, Cambridge, MA.