1. Attak H., Combalia M., Gardikis G., Gastón B., Jacquin L., Litke A., et al. Application of distributed computing and machine learning technologies to cybersecurity. Space 2:I2CAT.
2. Intrusion detection systems: a survey and taxonomy;Axelsson,2000
3. Analysis of the 1999 darpa/lincoln laboratory ids evaluation data with netadhict;Brown,2009
4. A survey of data mining and machine learning methods for cyber security intrusion detection;Buczak;IEEE Commun Surv Tutor,2016
5. Xgboost: a scalable tree boosting system;Chen;CoRR,2016