References
[1]. Hua TANG, ZhuolinCAO (2009). ”Machine learning
based Intrusion Detection Algorithms”, Journal of
Computational Information Systems Vol. 5, pp. 61825-
1831.
[2]. Laheeb Mohammad Ibrahim (2010). “Anamoly network intrusion detection system based on distributed
time-delay neural network (DTDNN)”, Journal of
Engineering Science and Technology, Vol. 5, pp. 4457-
471.
[3]. Mukhopadhyay1, MChakraborty, S Chakrabarti, T
Chatterjee (2011). "Back Propagation Neural Network
Approach for Intrusion Detection System", International
Conference on Recent Trends in Information Systems,
IEEE Publication.
[4]. Sufyan T. Faraj Al-Janabi, Hadeel Amjed Saeed
(2011). “A Neural Network Based Anomaly Intrusion
Detection System”, Developments in E-systems
Engineering, IEEE Publication - 978-0-7695-4593-6/11,
DOI 0.1109/DeSE.2011.19
[5]. Devikrishna K S, Ramakrishna B B (2013). "An Artificial
Neural Network based Intrusion Detection System and
Classification of Attacks", International Journal of
Engineering Research and Applications (IJERA) ISSN:
2248-9622,Vol. 3, Issue 4, Jul-Aug 2013, pp. 1959-1964.
[6]. Ryan, J., Lin, M., & Miikkulainen, R. (1998). ”Intrusion
detection with neural networks”. Advances in Neural
Information Processing Systems”, Vol.10 Cambridge,
MA:Springer.
[7]. T. Zhou and LI Yang (2008). "The Research of Intrusion
Detection Based on Genetic NeuralNetwork",
Proceedings of the 2008 International Conference on Wavelet Analysis and Pattern Recognition, Hong Kong,
IEEE.
[8]. M. Vallipuram and B. Robert (2004). "An Intelligent
Intrusion Detection System based on Neural Network",
IADIS International Conference Applied Computing.
[9]. DimaNovikov, Roman V. Yampolskiy and Leon Reznik
(2006). “Anomaly Detection Based Intrusion Detection”,
Proceedings of the Third International Conference on
Information Technology: New Generations, IEEE.
[10]. Ghosh, A.K., Wanken, J. and Charron, F. (1998).
“Detecting Anomalous and Unknown Intrusions against
Programs”, Proceedings of the Annual Computer Security
Applications Conference (ACSAC'98), December 1998
[11]. Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, and
Ali A. Ghorbani (2009). “ A Detailed Analysis of the KDD
CUP 99 Data Set”, Proceedings of the 2009 IEEE
Symposium on Computational Intelligence in Security
and Defense Applications (CISDA 2009)
[12]. S.Rajasekaran, G.A.VijayalakshmiPai (2007).
“Neural Networks, Fuzzy Logic and Genetic Algorithms
Synthesis and Applications”, PHI, ISBN-978-81-203-2186-
1, February, 2007
[13]. MonowarH.Bhuyan, D.K. Bhattacharyya and J.K.
Kalita (2014). “Network Anomaly Detection: Methods,
Systems and Tools”, IEEE Communications Surveys &
Tutorials, Vol. 16, No.1, FIRST QUARTER, 2014.