[1] Hindy, H. & L. Jain, "A taxonomy and survey of intrusion detection system design techniques, network threats and datasets," " International Journal of Innovative Technology and Exploring Engineering (IJITEE), 5(2), pp. 298-309, 2018.
[2] Mirjalili, S., "Dragonfly algorithm: a new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems," Neural Computing and Applications, 27(4), pp. 1053-1073, 2016.
[3] Yahalom, R., "Improving the effectiveness of intrusion detection systems for hierarchical data. Knowledge-Based Systems," International Journal of Innovative Technology and Exploring Engineering (IJITEE), 5(4), pp. 59-69, 2019.
[4] Farnaaz, N. & M. Jabbar, "Random forest modeling for network intrusion detection system. Procedia Computer Science," 89, pp. 213-217, 2016.
[5] Kuang, F., W. Xu, & S. Zhang, "A novel hybrid KPCA and SVM with GA model for intrusion detection. Applied Soft Computing," 18, pp. 178-184, 2014.
[6] Faker, O. & E. Dogdu. "Intrusion detection using big data and deep learning techniques," in Proceedings of the 2019 ACM Southeast Conference, 2019.
[7] Mohammadi, S., "Cyber intrusion detection by combined feature selection algorithm," Journal of information security and applications, 44, pp. 80-88, 2019.
[8] Choudhary, S. & N. Kesswani, "Analysis of KDD-Cup’99, NSL-KDD and UNSW-NB15 datasets using deep learning in IoT," Procedia Computer Science, 167, pp. 1561-1573, 2020.
[9] Javaid, A., "A deep learning approach for network intrusion detection system," Eai Endorsed Transactions on Security and Safety, 3(9), p. e2, 2016.
[10] Aishwarya, C., "Intrusion Detection System using KDD Cup 99 Dataset," International Journal of Innovative Technology and Exploring Engineering (IJITEE), 9(4), pp. 3169-3171, 2020.
[11] Singh Panwar, S., Y. Raiwani, & L.S. Panwar. "Evaluation of network intrusion detection with features selection and machine learning algorithms on CICIDS-2017 dataset," in International Conference on Advances in Engineering Science Management & Technology (ICAESMT)-2019, Uttaranchal University, Dehradun, India. 2019.
[12] Mafarja, M.M., "Binary dragonfly algorithm for feature selection," in 2017 International conference on new trends in computing sciences (ICTCS). 2017. IEEE.
[13] Farnaaz, N. & M. Jabbar, "Random forest modeling for network intrusion detection system," Procedia Computer Science, 89, pp. 213-217, 2016.
[14] Junker, M., R. Hoch, & A. Dengel. "On the evaluation of document analysis components by recall, precision, and accuracy," in Proceedings of the Fifth International Conference on Document Analysis and Recognition. ICDAR'99 (Cat. No. PR00318). 1999. IEEE.