1. J. P. Anderson, Computer Security Threat Monitoring and Surveillance, Technical Report, James Anderson Report, Pennsylvania, (1980).
2. A Comprehensive Analysis and Study in IDS Using Data Mining Techniques;Nadiammai;IJCA,2011
3. Random Forests;Breiman;Machine Learning,2001
4. Network Intrusion Detection Using Hybrid Binary PSO and Random Forests Algorithm;Arif Jamal Malik;Security and Communication Networks,2012
5. Multi Stage Filter Using Enhanced Adaboost for Network IDS;Natesan;International Journal of Network Security and its Applications,2012