[1] N.Ye,S.M.Emran,Q.Chen,S.Vilbert.Multivariate Statistical Analysis of Audit Trails for Host-based Intrusion Detection.IEEE Transactions on Computers,vol.51,no.7,pp.810-820,2002.
[2] D.Naccache.Secure and Practical Identity-based Encryption.IET Information Security,vol.1,no.2,pp.59-64,2007.
[3] C.W.Chang,H.Pan,H.Y.Jia.A Secure Short MessageCommunication Protocol.International Journal of Automation and Computing,vol.5,no.2,pp.202-207,2008.
[4] R.Curry,P.Lichodzijewski,M.I.Heywood.Scaling Genetic Programming to Large Datasets Using Hierarchical Dynamic Subset Selection.IEEE Transactions on Systems,Man,and Cybernetics-Part B:Cybernetics,vol.37,no.4,pp.1065-1073,2007.
[5] S.X.Yang,R.Tin.A Hybrid Immigrants Scheme for Genetic Algorithms in Dynamic Environments.International Journal of Automation and Computing,voL 4,no.3,pp.243-254,2007.
[6] Z.W.Yu,J.J.P.Tsai,T.Weigert.An Automatically Tuning Intrusion Detection System.IEEE Transactions on Systerns,Man,and Cybernetics-Part B:Cybernetics,vol.37,no.2,pp.373-384,2007.
[7] F.Berzal,J.C.Cubero.An Effective Algorithm for Mining Subspace Clusters in Categorical Datasets.Data and Knowledge Engineering,vol.60,no.1,pp.51-70,2007.
[8] L.Z.Xiao,Z.Q.Shao,G.Liu.K-means Algorithm Based on Particle Swarm Optimization Algorithm for Anomaly In trusion Detection.In Proceedings of the 6th World Congress on Intelligent Control and Automation,IEEE Press,vol.2,pp.5854-5858,2006.
[9] F.H.F.Leung,H.K.Lain,S.H.Ling,P.K.S.Tam.Tun ing of the Structure and Parameters of a Neural Network Using an Improved Genetic Algorithm.IEEE Transactions on Neural Networks,vol.14,no.1,pp.79-88,2003.
[10] S.M.Bridges,R.B.Vaughn.Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection.In Pro ceedings of the 12th Annual Canadian Information Technology Security Symposium,Baltimore,USA,pp.109-122,2000.
[11] W.Li.A Genetic Algorithm Approach to Network Intrusion Detection,SANS Institute,USA,2004.
[12] K.Triantafyllopoulos,J.Pikoulas.Multivariate Bayesian Regression Applied to the Problem of Network Security.Journal of Forecasting,vol.21,no.8,pp.579-594,2002.
[13] F.Min.A Novel Intrusion Detection Method Based on Combining Ensemble Learning with Induction-enhanced Particle Swarm Algorithm.In Proceedings of the 3rd International Conference on Natural Computation,IEEE Press,vol.3,pp.520-524,2007.
[14] D.Parrott,X.D.Li.Locating and Tracking Multiple Dynamic Optima by a Particle Swarm Model Using Speciation.IEEE Transactions on Evolutionary Computation,vol.10,no.4,pp.440-458,2006.
[15] S.C.Chiam,K.C.Tan,A.S.Al Mamum.Evolutionary Multi-objective Portfolio Optimization in Practical Context.International Journal of Automation and Computing,vol.5,no.1,pp.67-80,2008.
[16] Jaw Neural Network Simulator,Department of Computer Architecture,Wilhelm-Schiekard-Institnte for Computer Science,University of Tbingen,[online] ,Available:http://www-ra.informatik.uni-tuebingen.de/down loads/JavaNNS.