1. E. Spafford and S. Kumar, A software architecture to support misuse intrusion detection, in Proceedings of the 18th National Information Security Conference, 1995, pp. 194-204.
2. B. Caswell and J. Beale, Snort 2.1 intrusion detection. Syn- gress, 2004.
3. J. P. A. Co, Computer Security Threat Monitoring and Surveil- lance, 1980.
4. D. E. Denning, Intrusion-Detection Model, IEEE Trans. Softw. Eng., vol. SE-13, no. 2, pp. 222-232, 1987.
5. E. Popoola and A. O. Adewumi, Efficient feature selection tech- nique for network intrusion detection system using discrete differential evolution and decision.," International Journal Net- work Security, vol. 19, no. 5, pp. 660-669, 2017.