[1] Cansian A.M., Moreira E., Carvalho A., and Bonifacio J.M., “Network intrusion detection using neural networks”, in Proc. Int. Conf. on Computational Intelligence and Multimedia Applications, pp. 276-280, 1997.
[2] Yeung D.Y., Ding Y., “Host-based intrusion detection using dynamic and static behavioral models”, Journal of Pattern Recognition, Vol. 36, pp. 229-243, 2003.
[3] Garcia-Teodoro P., Diaz-Verdejo J., Macia-Fernandez G., and Vazquez E., “Anomaly-base network intrusion detection: techniques, systems and challenges”, Journal of Computers & Security, Vol. 28, pp. 18-28, 2009.
[4] Ramadas M., Ostermann S., and Tjaden B., “Detecting anomalous network traffic with self-organizing maps”, Recent Advances in Intrusion Detection, RAID, Lecture Notes in Computer Science (LNCS), Vol. 2820, pp. 36-54, 2003.
[5] Beghdad R., “Training all the KDD data set to classify and detect attacks”, Neural Network World, Vol. 17, pp. 81-91, 2007.
[6] Sheikhan M., Jadidi Z., “Misuse detection using hybrid of association rule mining and connectionist modeling”, World Applied Sciences Journal, Vol. 7, Special Issue of Computer & IT, pp. 31-37, 2009.
[7] Ye N., Emran S.M., Chen Q., and Vilbert S., “Multivariate statistical analysis of audit trials for host-based intrusion detection”, IEEE Transactions on Computers, Vol. 51, pp. 810-820, 2002.
[8] Kruegel C., Mutz D., Robertson W., and Valeur F., “Bayesian event classification for intrusion detection”, in Proc. Annual Computer Security Applications Conf., pp. 14-23, 2003.
[9] Song D., Heywood M.I., and Zincir-Heywood A.N., “Training genetic programming on half a million patterns: an example from anomaly detection”, IEEE Transactions on Evolutionary Computation, Vol. 9, pp. 225-239, 2005.
[10] Sequeira K., Zaki M., “ADMIT: anomaly-based data mining for intrusions”, in Proc. ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, pp. 386-395, 2002.
[11] Dickerson J.E., “Fuzzy network profiling for intrusion detection”, in Proc. North American Fuzzy Information Processing Society (NAFIPS) Int. Conf., pp. 301-306, 2000.
[12] Gomez J., Dasgupta D., “Evolving fuzzy classifiers for intrusion detection”, in Proc. IEEE Workshop on Information Assurance, pp. 68-75, 2002.
[13] Shon T., Moon J., “A hybrid machine learning approach to network anomaly detection”, Journal of Information Sciences, Vol. 177, pp. 3799-3821, 2007.
[14] Han S.J., Cho S.B., “Detecting intrusion with rule-based integration of multiple models”, Journal of Computers & Security, Vol. 22, pp. 613-623, 2003.
[15] Novikov D., Yampolskiy R.V., and Reznik L., “Artificial intelligence approaches for intrusion detection”, in Proc. IEEE Conf. on Systems, Applications and Technology, pp. 1-8, 2006.
[16] Biermann E., Cloeteand E., and Venter L.M., “A comparison of intrusion detection systems”, Journal of Computers & Security, Vol. 20, pp. 676-683, 2001.
[17] Debar H., Dorizzi B., “An application of recurrent network to an intrusion detection system”, in Proc. Int. Joint Conf. on Neural Networks, pp. 478-483, 1992.
[18] Kayacik G., Zincir-Heywood N., and Heywood M., “On the capability of an SOM-based intrusion detection system”, in Proc. Int. Joint Conf. on Neural Networks, pp. 1808-1813, 2003.
[19] Golovko V., Vaitsekhovich L., Kochurko P., and Rubanau U., “Dimensionality reduction and attack recognition using neural network approaches”, in Proc. Int. Joint Conf. on Neural Networks, pp. 2734-2739, 2007.
[20] Beghdad R., “Critical study of neural networks in detecting intrusions”, Journal of Computers and Security, Vol. 27, pp. 168-175, 2008.
[21] Sheikhan M., Sha'bani A.A., “Fast neural intrusion detection system based on hidden weight optimization algorithm and feature selection”, World Applied Sciences Journal, Special Issue of Computer & IT, Vol. 7, pp. 45-53, 2009.
[22] Sheikhan M., Jadidi Z., and Beheshti M., “Effects of feature reduction on the performance of attack recognition by static and dynamic neural networks”, World Applied Sciences Journal, Vol. 8, pp. 302-308, 2010.
[23] Joshi M.V., Agrawal R.C., and Kumar V., “Mining needless in a haystack: classifying rare classes via two-phase rule induction”, in Proc. ACM SIGMOD Conf. on Management of Data, pp. 91-102, 2001.
[24] Lin Y., Chen K., and Liao X., “A genetic clustering method for intrusion detection”, Journal of Pattern Recognition, Vol. 37, pp. 924-927, 2004.
[25] Pfahringer B., “Winning the KDD 99 classification cup: bagged boosting”, Journal of SIGKDD Explorations, Vol. 1, pp. 65-66, 2000.
[26] Levin I., “KDD classifier learning contest: LLSoft's results overview”, Journal of SIGKDD Explorations, Vol. 1, pp. 67-75, 2000.
[27] Denning D.E., “An intrusion-detection model”, IEEE Transactions on Software Engineering, Vol. 13, pp. 222-232, 1987.
[28] Mukkamala S., Janoski G., and Sung A.H., “Intrusion detection using neural networks and support vector machines”, in Proc. Int. Joint Conf. on Neural Networks, pp. 1702-1707, 2002.
[29] Abadeh M.S., Habibi J., and Lucas C., “Intrusion detection using a fuzzy genetic–based learning algorithm”, Journal of Network and Computer Applications, Vol. 30, pp. 414-428, 2005.
[30] Tajbakhsh A., Rahmati M., and Mirzaei A., “Intrusion detection using fuzzy association rules”, Journal of Applied Soft Computing, Vol. 9, pp. 462-469, 2009.
[31] Sheikhan M., Gharavian D., “Combination of Elman neural network and classification-based predictive association rules to improve computer networks' security”, World Applied Sciences Journal, Vol. 7, Special Issue of Computer & IT, pp. 80-86, 2009.
[32] Sheikhan M., Khalili A., “Intrusion detection based on rule extraction from dynamic cell structure neural network”, Majlesi Journal of Electrical Engineering, Vol. 4, No. 4, pp. 24-34, 2010.
[33] Tamilarasan A., Mukkamala S., Sung A.H., and Yendrapalli K., “Feature ranking and selection for intrusion detection using artificial neural networks and statistical methods”, in Proc. Int. Joint Conf. on Neural Networks, pp. 4754-4761, 2006.
[34] KDD Cup 1999 Data, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html, accessed July 2008.
[35] Hochman R., Khoshgoftaar T.M., Allen E.B., and Hudepohl J.P., “Using the genetic algorithm to build optimal neural networks for fault-prone module detection”, in Proc. 7th Int. Symp. on Software Reliability Engineering, pp. 152-162, 1996.
[36] Sheikhan M., Movaghar B., “Exchange rate prediction using an evolutionary connectionist model”, World Applied Sciences Journal, Special Issue of Computer & IT, Vol. 7, pp. 8-16, 2009.
[37] Agrawal R., Joshi M.V., “PNrule: a new framework for learning classifier models in data mining (a case-study in network intrusion detection)”, IBM Research Division, Report No. RC-21719, 2000.
[38] Duda R.O., Hart P.E., Pattern Classification and Scene Analysis, Wiley, 1973.
[39] Han F.M., Principles of Neurocomputing for Science and Engineering, McGraw Hill, 1991.
[40] Hartigan J.A., Clustering Algorithms, John Wiley and Sons, 1975.
[41] Lee Y., Classifiers: Adaptive Modules in Pattern Recognition Systems, Cambridge, MIT Press, 1989.
[42] Carpenter G.A., Grossberg S., Markuzon N., Reynolds J.H., and Rosen D.B., “Fuzzy ARTMAP: A neural network architecture for incremental supervised learning of analog multidimensional maps”, IEEE Transactions on Neural Networks, Vol. 3, pp. 698-713, 1992.
[43] Tran T.P., Jan T., “Boosted modified probabilistic neural network (BMPNN) for network intrusion detection”, in Proc. Int. Joint Conf. on Neural Networks, pp. 2354-2361, 2006.
[44] Chen Y., Abraham A., and Yang B., “Hybrid flexible neural-tree-based intrusion detection systems”, International Journal of Intelligent Systems, Vol. 22, pp. 337-352, 2007.
[45] Chang R-I., Lai L-B., Su W-D., Wang J-C., and Kouh J-S., “Intrusion detection by backpropagation neural networks with sample-query and attribute-query”, International Journal of Computational Intelligence Research, Vol. 3, pp. 6-10, 2007.
[46] Venkatachalam V., Selvan S., “An approach for reducing the computational complexity of LAMSTAR intrusion detection system using principal component analysis”, International Journal of Computer Science, Vol. 2, pp. 76-84, 2007.
[47] Yu L., Chen B., and Xiao J., “An integrated system of intrusion detection based on rough set and wavelet neural network”, in Proc. IEEE Int. Conf. on Natural Computation, pp. 194-199, 2007.
[48] Sabhnani M., Serpen G., “Why machine learning algorithms fail in misuse detection on KDD intrusion detection data set”, Journal of Intelligent Data Analysis, Vol. 6, pp. 1-13, 2004.