1. Farooq Anjum , Dhanant Subhadrabandhu , and Saswati Sarkar . 2003 . Signature based intrusion detection for wireless ad-hoc networks: A comparative study of various routing protocols . In IEEE 58th Vehicular Technology Conference (VTC-2003-Fall, Vol. 3. IEEE , Orlando, Florida, USA, 2152–2156. Farooq Anjum, Dhanant Subhadrabandhu, and Saswati Sarkar. 2003. Signature based intrusion detection for wireless ad-hoc networks: A comparative study of various routing protocols. In IEEE 58th Vehicular Technology Conference (VTC-2003-Fall, Vol. 3. IEEE, Orlando, Florida, USA, 2152–2156.
2. Fuzziness based semi-supervised learning approach for intrusion detection system
3. Adversarial Examples Are Not Easily Detected
4. An Introduction to Support Vector Machines and Other Kernel-based Learning Methods
5. George Cybenko . 1989. Approximation by superpositions of a sigmoidal function. Mathematics of control, signals and systems 2, 4 ( 1989 ), 303–314. George Cybenko. 1989. Approximation by superpositions of a sigmoidal function. Mathematics of control, signals and systems 2, 4 (1989), 303–314.