Alan Bivens, Chandrika Palagiri, Raheda smith, Boleslaw Szymanski, Mark Embreehts, “Network-Based Intrusion detection using Neural Networks”, www.cs.rpi.edu/~szymansk/paper/anie02.pdf
Ajith Abraham, Ravi Jainb, Johnson Thomas, and Sang Yong Han, “D-SCIDS: Distributed soft computing intrusion detection system”, Journal of Network and Computer Applications, Elsevier, 2005.
Biswanath Mukherjee, Todd L. Heberlin, and Karl N. Levitt. Network intrusion detection. IEEE Network, 8(3):26–41, 1994.
Byunghae Cha, kyung Woo Park and Jaittyun Seo, “Neural Networks Techniques for Host Anomaly Intrusion Detection using Fixed Pattern Transformation. ICCSA 2005, LNCS 3481 pp. 254–263, 2005.
Susan M. Bridges and Rayford B. vaughnn, “Intrusion detection via fuzzy data mining”, Twelfth annual Canadian Information Technology Security Symposium June 19–23. The Ottawa Congress Centre.
Andrew H. Sung and Srinivas Mukkamala, “Identifying important features for intrusion detection using support vector machines and neural networks”. IEEE Proceedings of the 2003 Symposium on Application and the Internet (SAINT’03).
Jonatan Gomez and Dipankar Dasgupa “Evolving Classifiers for Intrusion Detection”, Proceedings of the 2002 IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY, June 2001
John E. Dickerson, Jukka Juslin, Uuramia Koukousoula, and Julie A. Dickerson, “Fuzzy intrusion detection (FIRE)”, Electrical and Computer Engineering Department, IOWA state University, Ames, IA, USA. www.engJastate.edu/~julied/research.html
Christopher Krungel, Darren Mutz, William Robertson and Fredik Valuer, “Bayesian Event classification for intrusion detection”, Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC’03), 2003
Miroslav Kubat and Stan Matwin, “Addressing the curse of Imbalanced Training Sets: One sided selection” Proc. 14th International Conference on Machine Learning, 1997
KDD Cup 1999 Data: http://kdd.ics.uci.edu/databases/kddcup99/