[1] Di Mauro, M; Galatro, G; Fortino, G; & Liotta, A, "Supervised Feature Selection Techniques in Network Intrusion Detection: A Critical Review," Engineering Application of Artificial Intelligence, vol. 101, pp. 104-216, 2021.
[2] Thakkar, A. & Lohiya, R. "A Survey on Intrusion Detection System: Feature Selection, Model, Performance Measures, Application Perspective, Challenges, and Future Research Directions," Artifical Intellignce Review, vol. 55, no. 1, pp. 453-563, 2022.
[3] Almasoudy, F. H. Al-Yaseen, W. L. & Idrees, A. K. "Differential Evolution Wrapper Feature Selection for Intrusion Detection System," Procedia Computer Science, vol. 167, pp. 1230-1239, 2020.
[4] Musa, U. S. Chakraborty, S. Abdullahi, M. M. & Maini, T. "A Review on Intrusion Detection System using Machine Learning Techniques," International Conference on Computing, Communication, and Intelligence Systems (ICCCIS). IEEE, pp. 541-549, 2021.
[5] Panigrahi, R. Borah, S. Bhoi, A. K. Ijaz, M. F. Pramanik, M. Jhaveri, R. H. & Chowdhary, C. L. "Performance Assessment of Supervised Classifiers for Designing Intrusion Detection Systems: A Comprehensive Review and Recommendations for Future Research," Mathematics, vol. 9, no. 6, pp. 690, 2021.
[6] Ozkan-Okay, M. Samet, R. Aslan, Ö. & Gupta, D. "A Comprehensive Systematic Literature Review on Intrusion Detection Systems," IEEE Access, vol. 9, pp. 157727-157760, 2021.
[7] Hodo, E. Bellekens, X. Hamilton, A. Tachtatzis, C. & Atkinson, R. "Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey," arXiv preprint, arXiv:1701.02145, 2017.
[8] Lansky, J. Ali, S. Mohammadi, M. Majeed, M. K. Karim, S. H. T. Rashidi, S. ... & Rahmani, A. M. "Deep Learning-Based Intrusion Detection Systems: A Systematic Review," IEEE Access, vol. 9, pp. 101574-101599, 2021.
[9] Lee, S. W. Mohammadi, M. Rashidi, S. Rahmani, A. M. Masdari, M. & Hosseinzadeh, M. "Towards Secure Intrusion Detection Systems using Deep Learning Techniques: Comprehensive Analysis and Review," Journal of Network Computer Application, vol. 187, pp. 103-111, 2021.
[10] Ahmad, Z. Shahid Khan, A. Wai Shiang, C. Abdullah, J. & Ahmad, F. "Network Intrusion Detection System: A Systematic Study of Machine Mearning and Deep Learning Approaches," Transaction on Emerging Telecommunications Technologies, vol. 32, no. 1, pp. 41-50, 2021.
[11] Akay, B. Karaboga, D. & Akay, R. "A Comprehensive Survey on Optimizing Deep Learning Models by Metaheuristics," Artifical Intelligence Review, pp. 1-66, 2022.
[12] Abd Elaziz, M. Dahou, A. Abualigah, L. Yu, L. Alshinwan, M. Khasawneh, A. M. & Lu, S. "Advanced Metaheuristic Optimization Techniques in Applications of Deep Neural Networks: a Review," Neural Computing and Applications, pp. 1-21, 2021.
[13] Wang, C. Ye, X. He, X. Tian, Y. & Gong, L. "Two-Level Feature Selection Method for Low Detection Rate Attacks in Intrusion Detection," Internation Conference, Security and Privacy in New Computing Environments, Springer, Cham, pp. 689-696, 2019.
[14] Wang, Z. Tang, M. Deng, J. Wang, Y. Qian, J. & Chen, X. "A New Feature Selection Method for Intrusion Detection," IEEE International Conference on Ubiquitous Computing and Communication (IUCC) Data Science Computational Intelligence (DSCI) Smart Computing Networking and Services (SmartCNS), pp. 298-304, 2019.
[15] Najafi, M. & Rafeh, R. "A New Light Weight Intrusion Detection Algorithm for Computer Networks," Advance Defence Science Technology, vol. 8, no. 29, pp. 191-200, 2017. (In Persian)
[16] Keshavarzi, M.; & Momenzadeh, H. "Improving Intrusion Detection Systems by Feature Reducing Based on Genetic Algorithm and Data Mining Techniques," Communication Engineering, vol. 8, no. 32, pp. 1-13, 2019. (In Persian)
[17] Parsa, S.; & Aarabi, S. H. R. "A New Approach to Network Intrusion Detection Based on Hybrid Methods," Electronic and Cyber Defence, vol. 5, no. 3, pp. 79-93, 2017. (In Persian)
[18] Gaur, V.; & Kumar, R. "Analysis of Machine Learning Classifiers for Early Detection of DDoS Attacks on IoT Devices," Arabian Journal for Science Engineerig, vol. 47, no. 2, pp. 1353-1374, 2022.
[19] Hooshmand, M. K. "Using Ensemble Learning Approach to Identify Rare Cyber-Attacks in Network Traffic Data," International Conference on Advanced Computer science and Information Systems (ICACSIS) IEEE, pp. 141-146, 2020.
[20] Kazemitabar, J.; Taheri, R.; & Kheradmandian, GH. " A Novel Technique for Improvement of Intrusion Detection via Combining Random Forrest and Genetic Algorithm," Advanced Defence Science Technology, vol. 10, no. 37, pp. 287-296, 2019. (In Persian)
[21] Taheri, R. Parsaei, M. R. & Javidan, R. "Real-Time Intrusion Detection System Using a Combination of Discretization and Feature Selection," Advanced Defence Science Technology, vol. 8, no. 29, pp. 251-263, 2017. (In Persian)
[22] Upadhyay, D. Manero, J. Zaman, M. & Sampalli, S. "Intrusion Detection in SCADA Based Power Grids: Recursive Feature Elimination Model with Majority Vote Ensemble Algorithm," IEEE Transaction on Network Science and Engineering, vol. 8, no. 3, pp. 2559-2574, 2021.
[23] Hassan Nataj Solhdar, M. Janinasab Solahdar, M. & Eskandari, S. "An Intrusion Detection System with a Parallel Multi-Layer Neural Network," Journal of Mathematical Modeling, vol. 9, no. 3, pp. 437-450, 2021.
[24] Haghighat, M. H. & Li, J. "Intrusion Detection System using Voting-based Neural Network," Tsinghua Science and Technology, vol. 26, no. 4, pp. 484-495, 2021.
[25] Haghnegahdar, L. & Wang, Y. "A Whale Optimization Algorithm-Trained Artificial Neural Network for Smart Grid Cyber Intrusion Detection," Neural Computing and Applications, vol. 32, no. 13, pp. 9427-9441, 2020.
[26] Yang, H. & Zhou, Z. "A Novel Intrusion Detection Scheme using Cloud Grey Wolf Optimizer," 37th Chinese Control Conference (CCC) IEEE, pp. 8297-8302, 2018.
[27] Chen, C. Song, L. Bo, C. & Shuo, W. "A Support Vector Machine with Particle Swarm Optimization Grey Wolf Optimizer for Network Intrusion Detection, " International Conference on Big Data Analysis Computer Science (BDACS) IEEE, pp. 199-204, 2021.
[28] Bala, R. & Nagpal, R. "A Review on Kdd cup99 and Nsl Nsl-kdd Dataset," International Journal Advanced Reserarch in Computer Science, vol. 10, no. 2, 2019.
[29] Amiri, F. Yousefi, M. R. Lucas, C. Shakery, A. & Yazdani, N."Mutual Information-based Feature Selection for Intrusion Detection Systems," Journal of Network and Computer Applications, vol. 34, no. 4, pp. 1184-1199, 2011.
[30] Shakeela, S. Shankar, N. S. Reddy, P. M. Tulasi, T. K. & Sai, M. M. "Optimal Ensemble Learning Based on Distinctive Feature Selection by Univariate ANOVA-F Statistics for IDS," International Journal of Electronics and Telecommunications, vol. 67, no. 2, pp. 267-275, 2021.