1. William Stallings, Cryptography and Network Security Principles and Practices, fourth ed., Published by Prentice Hall, Pub Date: November 16, 2005, p. 13.
2. K. Saxena, A. Awasthi, A Case study on cyber threats and solution Global J. Res. Analysis, 4 (5) (2015) 197–198.
3. http://www.ijser.org Intrusion Detection System and Classification of Attacks '', 3 (4) (Jul-Aug 2013).
4. G.V. Nadiammai, S. Krishnaveni, M. Hemalatha, A comprehensive analysis and study in intrusion detection system using data mining techniques, Int. J. Computer Applications, 35 (8) (2011).
5. Intelligent feature selection and classification techniques for intrusion detection in networks: a survey;Ganapathy;EURASIP J. Wireless Commun. Networking,2013