1. Nist special publication 800-33: underlying technical models for information technology security;Stoneburner,2001
2. Nature inspired techniques and applications in intrusion detection systems: recent progress and updated perspective;Thakur;Arch. Comput. Meth. Eng.,2020
3. Comparison deep learning method to traditional methods for network intrusion detection;Dong,2016
4. The realisation of goal-driven airport enclosures intrusion alarm system;Yao;Int. J. Grid Util. Comput.,2017
5. Network anomaly detection using IP flows with principal component analysis and ant colony optimization;Femandes;J. Netw. Comput. Appl.,2016