M. Hosseinzadeh Aghdam and P. Kabiri, “Feature Selection for Intrusion Detection System Using Ant Colony Optimization,” International Journal of Network Security, vol. 18, pp. 420-432, 2016.##
F. Amiri, M. Rezaei.Yousefi, and C. Lucas, “Mutual information-based feature selection for intrusion detection systems,” International Journal of Network and Computer Applications, vol. 34, pp. 1184-1199, 2011.##
|
S. Horng, M. Su, Y. Chen, and T. Kao, “A novel intrusion detection system based on hierarchical clustering and support vector machines,” International Journal of Expert Systems with Applications, vol. 38, pp. 306-3313, 2011.##
|
A. Toosi and M. Kahani, “A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers,” International Journal of Computer Communications, vol. 30, pp. 2201-2212, 2007.##
|
H.-H. Gao, H.-H. Yang, and X.-Y. Wang, “Ant colony optimization based network intrusion feature selection and detection,” in Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, Guangzhou, 2005.##
|
D. M. Powers, “Evaluation: From Precision, Recall and F-Factor to ROC, Informedness, Markedness & Correlation,” School of Informatics and Engineering Flinders University, Adelaide-Australia , December 2007.##
|
A. S. Al-Aziz, A. T. Azar, M. Al-Salama, A. E. Hassanien, and S. E. Hanafy, “Genetic Algorithm with Different Feature Selection Techniques for Anomaly Detectors Generation,” in Computer Science and Information Systems, Krakow, 2013.##
|
A. Alazab, M. Hobbs, J. Abawajy, and M. Alazab, “Using Feature selection for intrusion detection system,” in Communications and Information Technologies (ISCIT), Gold Coast of Australia, 2012.##
|
M. Ambusaidi, H. Xiangjian, and N. Priyadarsi, “Building an Intrusion Detection System Using a Filter Based Feature selection algorithm,” IEEE Transactions on Computers, vol. 65, pp. 2986 - 2998, 2016.##
|
E. Amoroso, “Intrusion Detection: An Introduction to Internet Surveillance,” Correlation, Trace Back, Traps, and Response, Sparta, Intrusion.Net, 1999.##
S. Zargari and D. Voorhis, “Feature Selection in the Corrected KDD-dataset,” in Emerging Intelligent Data and Web Technologies, Third International Conference, 2012.##
|
|
F. Zhang and D. Wang, “An Effective Feature Selection Approach for Network Intrusion Detection,” in Networking, Architecture and Storage(NAS), IEEE Eighth International Conference, 2013.##
|
A. Tesfahun and L. Bhaskari, “Intrusion Detection using Random Forests Classifier with SMOTE and Feature Reduction,” in Cloud & Ubiquitous Computing & Emerging Technologies(CUBE), International Conference, 2013.##
|
M. Tavallaee and E. Bagheri, “A Detailed Analysis of the KDD CUP 99 Data Set,” in Computational Intelligence for Security and Defense Applications (CISDA), Second IEEE Symposium, 2009.##
|
S. Tabakhi, P. Moradi, and F. Akhlaghian, “An unsupervised feature selection algorithm based on ant colony optimization,” Engineering Applications of Artificial Intelligence, vol. 32, pp. 112-123, 2014.##
|
A. Sepahi and J. Rasool, “A Hybrid Approach of Similarity-based and Scenario-based Algorithms in Alert Correlation, Tehran, Sharif University of Technology, 2014. (In Persian)##
|
R. Lippmann, J. Haines, D. Fried, J. Korba, and K. Das, “Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation,” Lecture Notes in Computer Science(LNCS), vol. 1097, pp. 162-182, 2000.##
|
H. S. Chae, B. O. Jo, S. H. Choi, and T. K. Park, “Feature Selection for Intrusion Detection using NSL-KDD,” in Applied Computing Conference(ACC), China, 2014.##
|
M. Mirzaei and M. Bashiri, “Ant Colony Optimization,” Tehran, Bazagani, 2010. (In Persian)##
|
Durigo and Marco, “Ant Colony Optimization,” Tehran, Naghoos, 2016. (In Persian)##
|
O. Namadchian, “Anomaly-Based Intrusion Detection using Memetic algorithm,” Tehran, Malek Ashtar University, 2010. (In Persian)##
|
M. Ghazanfari and S. Alizadeh, “Data mining and knowledge discovery,” Tehran, ElmoSanat University, 2013. (In Persian)##
|
S. Parsa and S. H. R. Arabi, “Provide a new approach based on a combination method to detect network intrusion,” Electronic and cyber defense, vol. 3, pp. 79-93, 2017. (In Persian)##
|