1. Revisiting LISYS: parameters and normal behavior;Balthrop,2002
2. Data Mining for Network Intrusion Detection: How to Get Started;Bloedorn,2001
3. Artificial neural networks for misuse detection;Cannady,1998
4. An off-the-shelf PSO;Carlisle,2001
5. Handbook of Genetic Algorithms;Davis,1991