1. Jiang Jianchun, Ma Heng Tai, Ren dang'en. Network security intrusion detection: Overview of study [J]. Journal of software, 2000 (11).
2. Liu Xiaodong. A New Mathematical Axiomatic System of Fuzzy Sets and Systems [J]. Journal of Fuzzy Mathematics, 1995, 3: 559-560.
3. Han Liyan, Wang Peizhuang. Applied fuzzy mathematics [C]. The publishing house of the capital university of economic and trade, 1989, 8: 31-43.
4. Zhang Hao, Tao Ran, Li Zhiyong et al. A Research and Application of Feature Selection based on KNN and Tabu Search Algorithm in the Intrusion Detection [J]. Acta Electronica Sinica, 2009, 37(7): 1628-1632.
5. Chen Shitao, Chen Guolong, Guo Wenzhong. Feature Selection of the Intrusion Detection Data based on Particle Swarm Optimization and Neighborhood Reduction [J]. Computer Research and Development, 2010, 47(7): 126-1267.