1. N. Ye, X. Li, A scalable clustering technique for intrusion signature recognition, in: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, US Military Academy, West Point, NY, 5–6 June 2001, pp. 1–4.
2. L. Mé, Audit de Sécurité par Algorithmes Génétique, Doctoral dissertation, University of Rennes 1, Rennes, France, 1994.
3. Y. Bouzida, F.Cuppens, Neural networks vs. decision trees for intrusion detection, in: IEEE/IST Workshop on Monitoring, Attack Detection and Mitigation (MonAM), Tuebingen, Germany, 28–29 September 2006.
4. A framework for constructing features and models for intrusion detection systems;Lee;ACM Transactions on Information and System Security,2000
5. M.V. Mahoney, P.K. Chan, Detecting Novel Attacks by Identifying Anomalous Network Packet Headers, Technical Report, Florida Institute of Technology, CS-2001-2, 2001.