L. Rokach, “Ensemble-based classifiers,” Artificial Intelligence Review, vol. 33, no. 1, pp. 1-39, 2010.
V. Engen, “Machine learning for network based intrusion detection: an investigation into discrepancies in findings with the KDD cup'99 data set and multi-objective evolution of neural network classifier ensembles from imbalanced data,” Doctoral dissertation, Bournemouth University, 2010.
L. I. Kuncheva, “Combining pattern classifiers: methods and algorithms,” John Wiley & Sons, 2004.
F. H. Abbasi, R. Harris, S. Marsland, and G. Moretti, “An exemplar‐based learning approach for detection and classification of malicious network streams in honeynets,” Security and Communication Networks, vol. 7, no. 2, pp. 352-364, 2014.
H. Parvin, S. Ansari, and S. Parvin, “Proposing a New Method for Non-relative Imbalanced Dataset,” Soft Computing Models in Industrial and Environmental Applications, pp. 297-306, 2013.
H. Parvin, B. Minaei-Bidgoli, H. Alinejad-Rokny, and W. F. Punch, “Data weighing mechanisms for clustering ensembles,” Computers & Electrical Engineering, vol. 39, no. 5, pp. 1433-1450, 2013.
R. K. Shahzad and N. Lavesson, “Comparative analysis of voting schemes for ensemble-based malware detection,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 4, no. 1, pp. 98-117, 2013.
Y.-B. Lu, S.-C. Din, C.-F. Zheng, and B.-J. Gao, “Using multi-feature and classifier ensembles to improve malware detection,” Journal of CCIT, vol. 39, no. 2, pp. 57-72, 2010.
F. Stumpf, A. Görlach, F. Homann, and L. Brückner, “NoSE-building virtual honeynets made easy,” in Proceedings of the 12th International Linux System Technology Conference, Hamburg, Germany, 2005.
P. Baecher, M. Koetter, T. Holz, M. Dornseif, and F. Freiling, “The nepenthes platform: An efficient approach to collect malware,” in Recent Advances in Intrusion Detection, Springer, pp. 165-184, 2006.
W. Ren and H. Jin, “Honeynet based distributed adaptive network forensics and active real time investigation,” in Proceedings of the 2005 ACM symposium on Applied computing, pp. 302-303, 2005.
J. Levine, J. Grizzard, and H. Owen, “Application of a methodology to characterize rootkits retrieved from honeynets,” in Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC, IEEE, pp. 15-21, 2004.
K. Lin and L. Kyaw, “Hybrid Honeypot System for Network Security,” 2008.
J. K. Jones and G. W. Romney, “Honeynets: an educational resource for IT security,” in Proceedings of the 5th conference on Information technology education, ACM, pp. 24-28, 2004.
G. Portokalidis, A. Slowinska, and H. Bos, “Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation,” in ACM SIGOPS Operating Systems Review, vol. 40, no. 4, pp. 15-27, 2006.
J. Goebel, T. Holz, and C. Willems, “Measurement and analysis of autonomous spreading malware in a university environment,” Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 109-128, 2007.