[1] R. Andrews, J. Diederich, and A.B. Tickle, “A survey and critique of techniques for extracting rules from trained artificial neural networks”, Knowledge-Based Systems, 8, pp. 373-389, (1995)
[2] F. Behloul, B.P.F. Lelieveldt, A. Boudraa, and J.H.C. Reiber, “Optimal design of radial basis function neural networks for fuzzy-rule extraction in high dimensional data”, Pattern Recognition, 35, pp. 659-675, (2002).
[3] C.J. Mantas, J.M. Puche, and J.M. Mantas, “Extraction of similarity based fuzzy rules from artificial neural networks”, International Journal of Approximate Reasoning, 43, pp. 202-221, (2006)
[4] G. Towell, and J. Shavlik, “The extraction of refined rules from knowledge based neural networks”, Machine Learning, 13, pp. 71-101, (1993)
[5] C.W. Omlin, and C.L. Giles, “Extraction of rules from discrete-time recurrent neural networks”, Neural Networks, 9, pp. 41-52, (1996)
[6] S.H. Huang, and H. Xing, “Extract intelligible and concise fuzzy rules from neural networks”, Fuzzy Sets and Systems, 132, pp. 233-243, (2002)
[7] G. Bologna, “Is it worth generating rules from neural network ensembles?”, Journal of Applied Logic, 2, pp. 325-348, (2004)
[8] G. Leng, T.M. McGinnity, and G. Prasad, “An approach for on-line extraction of fuzzy rules using a self-organizing fuzzy neural network”, Fuzzy Sets and Systems, 150, pp. 211-243, (2005)
[9] E.R. Hruschka, and N.F.F. Ebecken, “Extracting rules from multilayer perceptrons in classification problems: a clustering-based approach”, Neurocomputing, 70, pp. 384-397, (2006)
[10] K. Odajima, Y. Hayashi, G. Tianxia, and R. Setiono, “Greedy rule generation from discrete data and its use in neural network rule extraction”, Neural Networks, 21, pp. 1020-1028, (2008)
[11] L.E. Zarate, S.M. Dias, and M.A.J. Song, “FCANN: A new approach for extraction and representation of knowledge from ANN trained via formal concept analysis”, Neurocomputing, 71, pp. 2670-2684, (2008)
[12] R. Setiono, B. Baesens, and C. Mues, “A note on knowledge discovery using neural networks and its application to credit card screening”, European Journal of Operational Research, 192, pp. 326-332, (2009)
[13] E. Kolman, and M. Margaliot, “Extracting symbolic knowledge from recurrent neural networks-a fuzzy logic approach”, Fuzzy Sets and Systems, 160, pp. 145-161, (2009)
[14] H. Kahramanli, and N. Allahverdi, “Rule extraction from trained adaptive neural networks using artificial immune systems”, Expert Systems with Applications, 36, pp. 1513-1522, (2009)
[15] S. Yu, X. Guo, K. Zhu, and J. Du, “A neuro-fuzzy-GA-BP method of seismic reservoir fuzzy rules extraction”, Expert Systems with Applications, 37, pp. 2037-2042, (2010)
[16] Y. Hayashi, “A neural expert system with automated extraction of fuzzy if-then rules”, Advances in Neural Information Processing Systems, Vol. 3, pp. 1263-1268, (1991)
[17] C.L. Giles, and C.W. Omlin, “Extraction, insertion, and refinement of symbolic rules in dynamically driven recurrent networks”, Connection Science, 5, pp. 307-328, (1993)
[18] L.M. Fu, “Rule generation from neural networks”, IEEE Transactions on System, Man and Cybernetics, 28, pp. 1114-1124, (1994)
[19] D.W. Optiz, and J.W. Shavlik, “Dynamically adding symbolically meaningful nodes to knowledge-based neural networks”, Knowledge-Based Systems, 8, pp. 301-311, (1995)
[20] K. Saito, and P. Nakano, “Medical diagnosis expert system based on PDP model”, Proc. Int. Conf. Neural Networks, Vol. 1, pp. 255-262, (1988)
[21] E. Keedwell, A. Narayanan, and D. Savic, “Creating rules from trained neural networks using genetic algorithms”, International Journal of Computers, Systeming Signals, 1, pp. 30-42, (2000)
[22] R. Andrews, and S. Geva, Rule extraction from local cluster neural nets, Neurocomputing, 47, pp. 1-20, (2002)
[23] K. McGarry, J. Tait, S. Wermter, and J. McIntyre, “Rule-extraction from radial basis function networks”, Proc. Int. Conf. Artificial Neural Networks, Vol. 1, pp. 613-618, (1999)
[24] K. McGarry, S. Wermter, and J. McIntyre, The extraction and comparison of knowledge from local function networks, International Journal of Computational Intelligence and Applications, 1, pp. 369-382, (2001)
[25] P. Garcia-Teodoro, J. Diaz-Verdejo, G. Macia-Fernandez, and E. Vazquez, “Anomaly-base network intrusion detection: techniques, systems and challenges”, Computers & Security, 28, pp. 18-28, (2009)
[26] P. Kabiri, and A.A. Ghorbani, “Research in intrusion detection and response-a survey”, International Journal of Network Security, 1, pp. 84-102, (2005)
[27] T. Shon, and J. Moon, “A hybrid machine learning approach to network anomaly detection”, Information Sciences, 177, pp. 3799-3821, (2007)
[28] Z. Chen, H. Wang, B. Yang, L. Wang, and R. Sun, “A FDRS-based data classification method used for abnormal network intrusion detection”, Proc. IEEE 3rd Int. Conf. Natural Computation, Vol. 2, pp. 375-380, (2007)
[29] Y. Chen, A. Abraham, and B. Yang, “Hybrid flexible neural-tree-based intrusion detection systems”, International Journal of Intelligent Systems, 22, pp. 337-352, (2007)
[30] R. Chang, L. Lai, W. Su, J. Wang, and J. Kouh, “Intrusion detection by backpropagation neural networks with sample-query and attribute-query”, International Journal of Computational Intelligence Research, 3, pp. 6-10, (2007)
[31] N. Ye, S.M. Emran, Q. Chen, and S. Vilbert, “Multivariate statistical analysis of audit trials for host-based intrusion detection”, IEEE Transactions on Computers, 51, pp. 810-820, (2002)
[32] C. Kruegel, D. Mutz, W. Robertson, and F. Valeur, “Bayesian event classification for intrusion detection”, Proceedings 19th Ann. Computer Security Applications Conf., pp. 14-23, (2003)
[33] M.V. Mahoney, and P.K. Chan, “Learning nonstationary models of normal network traffic for detecting novel attacks”, Proc. 8th ACM SIGKDD, pp. 376-385, (2002)
[34] R. Beghdad, “Training all the KDD data set to classify and detect attacks”, Neural Network World, 17, pp. 81-91, (2007)
[35] J. Gomez, and D. Dasgupta, “Evolving fuzzy classifiers for intrusion detection”, Proc. IEEE Workshop Information Assurance, pp. 68-75, (2002)
[36] D. Song, M.I. Heywood, and A.N. Zincir-Heywood, “Training genetic programming on half a million patterns: an example from anomaly detection”, IEEE Transactions on Evolutionary Computation, 9, pp. 225-239, (2005).
[37] Y. Liao, and V.R. Vemuri, “Use of K-nearest neighbor classifier for intrusion detection”, Computers & Security, 21, pp. 439-448, (2002)
[38] D. Novikov, R.V. Yampolskiy, and L. Reznik, “Artificial intelligence approaches for intrusion detection”, Proc. IEEE Conf. Systems, Applications and Technology, pp. 1-8, (2006)
[39] M.V. Joshi, R.C. Agrawal, and V. Kumar, “Mining needless in a haystack: classifying rare classes via two-phase rule induction”, Proc. ACM SIGMOD Conf. Management of Data, pp. 91-102, (2001)
[40] V. Golovko, and L. Vaitsekhovich, “Neural network techniques for intrusion detection”, Proc. Int. Conf. Neural Networks and Artificial Intelligence, pp. 65-69, (2006)
[41] A. Herrero, E. Corchado, P. Gastaldo, F. Picasso, and R. Zunino, “Auto-association neural techniques for intrusion detection systems”, Proc. IEEE Int. Symp. Industrial Electronics, pp. 1905-1910, (2007)
[42] R. Beghdad, “Critical study of neural networks in detecting intrusions”, Computers & Security, 27, pp. 168-175, (2008)
[43] M. Sheikhan, Z. Jadidi, and M. Beheshti, “Effects of feature reduction on the performance of attack recognition by static and dynamic neural networks”, World Applied Sciences Journal, 8, pp. 302-308, (2010)
[44] J.E. Dickerson, J. Juslin, J. Koukousoula, and J.A. Dickerson, “Fuzzy intrusion detection”, Proc. IFSA World Congress and 20th North American Fuzzy Information Processing Society (NAFIPS) Int. Conf., Vol. 3, pp. 1506-1510, (2001)
[45] Y. Lin, K. Chen, and X. Liao, “A genetic clustering method for intrusion detection”, Pattern Recognition, 37, pp. 924-927, (2004)
[46] B. Pfahringer, “Winning the KDD 99 classification cup: bagged boosting”, SIGKDD Explorations, 1, pp. 65-66, (2000)
[47] K. Shah, N. Dave, S. Chavon, S. Mukherjee, A. Abraham, and S. Sanyal, “Adaptive neuro-fuzzy intrusion detection system”, Proc. IEEE Int. Conf. Information Technology: Coding and Computing, Vol. 1, pp. 70-74, (2004)
[48] M.S. Abadeh, J. Habibi, and C. Lucas, “Intrusion detection using a fuzzy genetic–based learning algorithm”, Journal of Network and Computer Applications, 30, pp. 414-428, (2005)
[49] J. Bruske, and G. Sommer, “Dynamic cell structures”, Proc. Neural Information Processing Systems, pp. 497-504, (1994)
[50] B. Fritzke, “Growing cell-structures-a self-organizing network for unsupervised and supervised learning”, Neural Networks, 7, pp. 1441-1460, (1994)
[51] T.M. Martinez, “Competitive Hebbian learning rule forms perfectly topology preserving maps”, Proc. Int. Conf. Artificial Neural Networks, pp. 427-434, (1993)
[52] M. Darrah, B. Taylor, and M. Webb, “A geometric rule extraction approach used for verification and validation of a safety critical application”, Proc. 18th Annual Florida Artificial Intelligence Research Society Conf., Vol. 3, pp. 624-627, (2005)
[53] MIT Lincoln Lab., Information Systems Technology Group, “The 1998 intrusion detection off-line evaluation plan” (http://www.11.mit.edu/IST/ideval/docs/1998/id98-eval-11.txt, Mar. 1998).
[54] “1999 KDD cup competition” (http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html, 2007).
[55] W. Lee, S.J. Stolfo, and K.W. Mok, “Mining in a data-flow environment: experience in network intrusion detection”, Proc. 5th ACM SIGKDD, pp. 114-124, (1999)
[56] M.A. Sartori, and P.J. Antsaklis, “A Simple method to derive bounds on the size and to train multilayer neural networks”, IEEE Transactions on Neural Networks, 2, pp. 467-471, (1991)
[57] K. Rohani, M.S. Chen, and M.T. Manry, “Neural subnet design by direct polynomial mapping”, IEEE Transactions on Neural Networks, 3, pp. 1024-1026, (1992)
[58] H.H. Chen, M.T. Manry, and H. Chandrasekaran, “A neural network training algorithm utilizing multiple sets of linear equations”, Conference Record of the 30th Asilomar Conference on Signals, Systems and Computers, pp. 1166-1170, (1996)
[59] P. Werbos, “Backpropagation: past and future”, Proc. Int. Conf. Neural Networks, pp. 343-353, (1988)
[60] R.S. Scalero, and N. Tepedelenlioglu, “A fast new algorithm for training feedforward neural networks”, IEEE Transactions on Signal Processing, 40, pp. 202–210, (1992)
[61] A. Tamilarasan, S. Mukkamala, A.H. Sung, and K. Yendrapalli, “Feature ranking and selection for intrusion detection using artificial neural networks and statistical methods”, Proc. Int. Joint Conf. Neural Networks, pp. 4754-4761, (2006)
[62] R. Agrawal, and M.V. Joshi, “PNrule: a new framework for learning classifier models in data mining (a case-study in network intrusion detection)”, IBM Research Division Report No. RC-21719, (2000)
[63] I. Levin, “KDD classifier learning contest: LLSoft's results overview”, SIGKDD Explorations, 1, pp. 67-75, (2000)
[64] A. Nadjaran Toosi, and M. Kahani, “A novel soft computing model using adaptive neuro-fuzzy inference system for intrusion detection”, Proc. IEEE Int. Conf. Networking, Sensing and Control, pp. 834-839, (2007)
[65] M. Sabhnani, and G. Serpen, “Why machine learning algorithms fail in misuse detection on KDD intrusion detection data set”, Journal of Intelligent Data Analysis, 6, pp. 1-13, (2004)