1. Survey on intrusion detection techniques using data-mining domain;Babu;Int J Comput Distrib Syst,2014
2. Network anomaly detection: methods, systems and tools;Bhuyan;IEEE Commun Surv Tutor,2014
3. Using rough set and support vector machine for network intrusion detection;Chen;Int J Netw Secur Appl (IJNSA),2009
4. Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing);Cover,2006
5. A study on NSL-KDD dataset for intrusion detection system based on classification algorithms;Dhanabal;Int J Adv Res Comput Commun Eng, IJARCCE,2015