[1] S. Kent “On the trial of intrusions into information systems”, IEEE Spectrum, pp.52-56. Dec. 2000. [2] Chakraborty, B. Feature Subset Selection by Neuro-Rough Hybridization. Lecture Notes in Computer Science (LNCS), Springer, Heidelberg, 2005 [3] Sung, A. H. and Mukkamala, S. Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks, Proceedings of International Symposium on Applications and the Internet (SAINT) pp. 209-216, 2003
[4] M. Elrawy, M. F.Abdelhamid and T. K., A. M. “ IDS in
Telecommunication Network Using PCA”, (IJCNC), Vol.5, No.4, pp. 147- 157, Jul. 2013. [5] Gh.R .Zargar and T. Baghaie “Category-Based intrusion detection
using PCA”, Journal of Information Security, 3, pp. 259-271,2012. [6] https://en.wikipedia.org/wiki/Principal_component_analysis, (Access date 2017). [7] I. Jolliffe,“Principal Component Analysis”, 2nd Springer Verlag, 2002. [8] L. Shyu, S. Sarinnapakorn,K. Chang, andM. Chen,“A novel anomaly
detection scheme based on principal component classifier”, IEEE foundation(ICDM03), pp. 172-179, 2003. [9] http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html (Access date 2017). [10]S.K. Sahu, S. Sarangi and S.K. Jena “A Detail Analysis on Intrusion
Detection Datasets”, IEEE International Advance Computing Conference (IACC), 2014.