References
[1]. Bezroukov, Nikolai, "intrusion Dection (general
issues)" , Sof t panorama: open Sourc e Sof tware
Educational Society.URL:htfp://www,softpanorama.org/
Security/ intrusion_detection,html ( I 9 July 2003).
[2]. Bridges,Susan, and Rayford B.Vaughn, "Intrusion
Detection Via Fuzzy Data Mining" , In Proceedings of I 2h
Annual Canadian Technology Security Symposium,
pp. 109_122. Ottawa, Canada (2000).
[3]. Crosbie, Mark, and Gene Spafford, "Applying
Genetic Programming to intrusion Detection." In
proceedings of I 995 AAA! Fall Symposium on Genetic
Programming, pp. I -8 Cambridge, Massachusetts. URL:
http://citeseer~nj.nec.com/ crosbie95appiying.html
[4]. Graham, Robert, "FAQ: Network Intrusion Detection
Systems". RobertGraham.corn Homepage,
URL:http://www.robertgraham.com/pubs/network_intrusi
on_detection.htmi (Mar. 21, 2000).
[5]. Jones, Anita. K and Robert S.Sielken, "Computer
System Intrusion Detection: A Survey". Technical Report
Department of computer Science, University of Virginia,
Charlottesville, Virgina (2000).
[6]. Li, Wei, "The integration of security sensors into the
intelligent Intrusion Detection System (HOS) in a cluster
environment" . Master's Project Report, Department of
Computer Science, Mississippi State University (2002).
[7]. Masanori Hariyama, Tetsuya Aoyama, and
Michitaka kameyama, "Genetic Approach to Minimizing
Energy consumption of VLSI Processors using multiple
supply Voltages", IEEE Translations on Computers Vol.54,
No. 6, June 2005.
[8]. McHugh, John, "intrusion and Intrusion Detection",
Technical Report, CERT Coordination Center, Software
Engineering Instifife, Carnegic Mellon University (200 I ).
[9]. Ortiz-Boyer D., Hervas-Martinez C and Garcia-
Pedrajas N, "A Crossover Operator for Evolutionary
Algorithms Based On Population Features", Journal of
Artificial lnteliigenceResearch, Vol 24, page 1-48,(2005),
[1O]. Pohlheim Hartmut, "Genetic and Evolutionary
Algorithms: Principles, methods and Algorithms", Genetic
and Evolutionary Algorithm Toolbox, Harfmut Pohlheim.
URL: http://www.geatbx,com/ docu/algindex.html (2003).
[1 I ]. Sinclair, Chris, Lyn Pierce, and Sara Matzner, "An
Application of Machine Learning to Network Intrusion
Detection" . In Proceeding of 1 999 Annual Computer
Security Applications Conf. (ACSAC), pp, 3 71-3 7 7 ,
Phoenix, Arizona, URL:http://www.acsac.org/ papers/fro-b
I 030-sinciair.pdf. (1999).
[12]. Wei Li, "Using Genetic Algorithm for Network Intrusion
Detection" . Department of Computer Science and
Engineering, Mississippi State University, MS 39762, Email:
wli@cse.msstate.edu(2005).