References: [1] Santos, I., Brezo, F., Ugarte-Pedrero, X., et al. (2013). Opcode sequences as representation of executables for data-mining-based unknown malware detection. Information Sciences, 231, 64-82.
[2] Sindhu, S. S. S., Geetha, S., Kannan, A. (2012). Decision tree based light weight intrusion detection using a wrapper approach. Expert Systems with Applications, 39(1), 129-141.
[3] Davis, J. J., Clark, A. J. (2011). Data preprocessing for anomaly based network intrusion detection: A review. Computers & Security, 30(6), 353-375.
[4] Panda, M., Patra, M. R. (2009). A novel classification via clustering method for anomaly based network intrusion detection system. International Journal of Recent Trends in Engineering, 2(1), 1-6.
[5] Rehman, A., Saba, T. (2014). Evaluation of artificial intelligent techniques to secure information in enterprises. Artificial Intelligence Review, 42(4), 1029-1044.
[6] Ganapathy, S., Kulothungan, K., Muthurajkumar, S., et al. (2013). Intelligent feature selection and classification techniques for intrusion detection in networks: a survey. EURASIP Journal on Wireless Communications and Networking, 2013(1), 271.
[7] Linghu, H. Y., Chen, M., Wang, H. H., et al. (2009). Bayesian network intrusion detection method based on credibility of mutual information. Computer Engineering and Design, 14, 011. |