1. M. Kemiche and R. Beghdad, Intelligent Systems in Science and Information 2014: Extended and Selected Results from the Science and Information Conference 2014, Cham: Springer International Publishing, ch. Towards Using Games Theory to Detect New U2R Attacks, pp. 351-367, (2015). [Online]. Available: http://dx.doi.org/10.1007/978-3-319-14654-6-22.
2. S. Patil, D. V. K. B. P, S. Singha and R. Jamil, A Survey on Authentication Techniques for Wireless Sensor Networks, International Journal of Applied Engineering Research, vol. 7, (2012).
3. T. M. Mitchell, Machine Learning, 1st ed, New York, NY, USA: McGraw-Hill, Inc., (1997).
4. D. S. Kim and J. S. Park, Network-Based Intrusion Detection with Support Vector Machines, Information Networking: International Conference, ICOIN 2003, Cheju Island, Korea, February 12-14, (2003). Revised Selected Papers, Berlin, Heidelberg: Springer Berlin Heidelberg, ch. pp. 747-756, (2003). [Online]. Available: http://dx.doi.org/10.1007/978-3-540-45235-5-73.
5. H. Altwaijry and S. Algarny, Bayesian Based Intrusion Detection System, Journal of King Saud University – Computer and Information Sciences, vol. 24, no. 1, pp. 1-6, (2012). [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1319157811000292.