1. S. Revathi and A. Malathi, ‘‘A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection,’’ in Proc. Int. J. Eng. Res. Technol., 2013, pp. 1848–1853.
2. D. Sahoo, C. Liu, and S. C. H. Hoi. (2017). ‘‘Malicious URL detection using machine learning: A survey.’’ [Online]. Available: https://arxiv.org/abs/1701.07179
3. A survey of data mining and machine learning methods for cyber security intrusion detection;Buczak;IEEE Commun. Surveys Tuts.,2016
4. M. Soni, M. Ahirwa, and S. Agrawal, ‘‘A survey on intrusion detection techniques in MANET,’’ in Proc. Int. Conf. Comput. Intell. Commun. Netw., 2016, pp. 1027–1032.
5. R. G. Smith and J. Eckroth, ‘‘Building AI applications: Yesterday, today, and tomorrow,’’ AI Mag., vol. 38, no. 1, pp. 6–22, 2017.