1. Impact of denial of service attacks on ad hoc networks;Aad;IEEE/ACM Transactions on Networking,2008
2. Design and analysis of genetic fuzzy systems for intrusion detection in computer networks;Abadeh;Expert Systems with Applications,2011
3. Support vector machines (SVM) as a technique for solvency analysis;Auria,2008
4. Performance analysis of the confidant protocol;Buchegger,2002
5. Intrusion detection using a hybrid support vector machine based on entropy and TF-IDF;Chen;International Journal of Innovative Computing, Information and Control (IJICIC),2008