1. M. Bahrololum, E. Salahi, and M. Khaleghi. (2009) “Machine Learning Techniques for Feature Reduction in Intrusion Detection Systems: A Comparison,” Fourth Int. Conf. Comput. Sci. Converg. Inf. Technol
2. “Feature Ranking in Intrusion Detection Dataset using Combination of Filtering Methods,”;Karimi;Int. J. Comput. Appl.,2013
3. “A comparison of event models for Naive Bayes text classification.”;Andrew;AAAI-98 workshop on learning for text categorization,1998
4. M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani. (2009) “A Detailed Analysis of the KDD CUP 99 Data Set,” Submitted to Second IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA).
5. “SMOTE: Synthetic minority oversampling technique”;Chawla;Journal of Artificial Intelligence Research,2002