1. Abraham A. In: Jose M., Alberto P., editors, Neuro-fuzzy systems: state-of-the-art modeling techniques, connectionist models of neurons, learning processes, and artificial intelligence, Lecture Notes in Computer Science, vol. 2084. Germany, Granada, Spain: Springer; 2001. p. 269–76.
2. Intelligent systems: architectures and perspectives, recent advances in intelligent paradigms and applications;Abraham,2002
3. An empirical comparison of kernel selection for support vector machines. In: Proceedings of the second international conference on hybrid intelligent systems: design, management and applications;Ali,2002
4. Anderson JP. Computer security threat monitoring and surveillance. Technical Report, Fort Washington, Pennsylvania: James P Anderson Co.; April 1980.
5. ADAM: a testbed for exploring the use of data mining in intrusion detection;Barbara;SIGMOD Record,2001