1. The danger theory and its application to artificial immune systems;Aickelin,2002
2. Application of neural networks in identification of measurement anomaly detection;Akhgar;Int. Res. J. Appl. Basic Sci.,2013
3. Effective intrusion detection with a neural network ensemble using fuzzy clustering and stacking combination method;Amini;J. Comput. Secur.,2014
4. A hybrid method consisting of GA and SVM for intrusion detection system;Aslahi-Shahri;Neural Comput. Appl.,2015