Han, J., & Kamber, M. (2011). Pei. Data mining concepts and techniques. MK.
Liao, H. J., Lin, C. H. R., Lin, Y. C., & Tung, K. Y. (2013). Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications, 36(1), 16-24. https://doi.org/10.1016/j.jnca.2012.09.004
Salo, F., Nassif, A. B., & Essex, A. (2019). Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection. Computer Networks, 148, 164-175. https://doi.org/10.1016/j.comnet.2018.11.010
Senthil Murugan, N., & Usha Devi, G. (2018). Detecting streaming of Twitter spam using hybrid method. Wireless Personal Communications, 103(2), 1353-1374. https://doi.org/10.1007/s11277-018-5513-z
Khodayar M., Uzada A., (2013), intrusion detection in computer networks using combined machine learning techniques. 9th Science and Technology Advances Symposium, Second Commission of the National Conference of Computer Science and Engineering with a focus on national security and sustainable development, 12 pages.
Zhang, Y ., Lee, W., Huang, Y., (2003). Intrusion Detection Techniques for Mobile Wireless Networks, Mobile Networks and Applications, 16 Pages.
Viegas, E., Santin, A. O., Fransa, A., Jasinski, R., Pedroni, V. A., Oliveira, L. S. (2017). "Towards an Energy-Efficient Anomaly-Based Intrusion Detection Engine for Embedded Systems". IEEE Transactions on Computers. 66 (1): 163–177. doi:10.1109/TC.2016.2560839.
Maymandi, S., Mohammadi Shiv Kash, H., (2016). Investigating and analyzing intrusion detection solutions using data mining techniques,3-rd international conference on research in science and technology, 11 pages.
Heydari H., (2013), a proposed algorithmic paper to detect intrusion in computer networks using the combination of particle swarm method and Bayesian model classification, place of publication: the first international conference on the latest developments in electrical, electronic and computer engineering 5 pages.
Amini Khoei Z., Abdulla Puri A., 2015, title of the article Network traffic classification using improved random forest algorithm, place of publication: Journal of Computer Science, 15 pages.
Venkatesan, N., & Priya, G. (2015). A study of random forest algorithm with implementation using WEKA. International journal of innovative research in computer science and engineering, 1(6), 156-162.
Cutler, A., Cutler, D. R., & Stevens, J. R. (2012). Random Forests. Στο Ensemble Machine Learning (pp. 157–175). doi:10.1007/978-1-4419-9326-7_5