A. L. Buczak and E. Guven, "A survey of data mining and machine learning methods for cyber security intrusion detection," IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1153-1176, 2016.
 B. W. Masduki, K. Ramli, F. A. Saputra, and D. Sugiarto, "Study on implementation of machine learning methods combination for improving attacks detection accuracy on Intrusion Detection System (IDS)," in Quality in Research (QiR), 2015 International Conference on, 2015, pp. 56-64: IEEE.
 R. K. Sharma, H. K. Kalita, and P. Borah, "Analysis of machine learning techniques based intrusion detection systems," in Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics, 2016, pp. 485-493: Springer.
 Q. Yang, H. Fu, and T. Zhu, "An Optimization Method for Parameters of SVM in Network Intrusion Detection System," in Distributed Computing in Sensor Systems (DCOSS), 2016 International Conference on, 2016, pp. 136-142: IEEE.
 R. Kaur and M. Bansal, "Multidimensional attacks classification based on genetic algorithm and SVM," in Next Generation Computing Technologies (NGCT), 2016 2nd International Conference on, 2016, pp. 561-565: IEEE.
 A. Nema, B. Tiwari, and V. Tiwari, "Improving Accuracy for Intrusion Detection through Layered Approach Using Support Vector Machine with Feature Reduction," in Proceedings of the ACM Symposium on Women in Research 2016, 2016, pp. 26-31: ACM.
 H. Gharaee and H. Hosseinvand, "A new feature selection IDS based on genetic algorithm and SVM," in Telecommunications (IST), 2016 8th International Symposium on, 2016, pp. 139-144: IEEE.
 H. Gharaee and M. Fekri, "A New Feature Selection For Intrusion Detection System," International Journal of Academic Research, vol. 7, 2015.
 R. R. Reddy, Y. Ramadevi, and K. N. Sunitha, "Effective discriminant function for intrusion detection using SVM," in Advances in Computing, Communications and Informatics (ICACCI), 2016 International Conference on, 2016, pp. 1148-1153: IEEE.
 P. Nskh, M. N. Varma, and R. R. Naik, "Principle component analysis based intrusion detection system using support vector machine," in Recent Trends in Electronics, Information & Communication Technology (RTEICT), IEEE International Conference on, 2016, pp. 1344-1350: IEEE.
 P. Wang, K.-M. Chao, H.-C. Lin, W.-H. Lin, and C.-C. Lo, "An Efficient Flow Control Approach for SDN-Based Network Threat Detection and Migration Using Support Vector Machine," in e-Business Engineering (ICEBE), 2016 IEEE 13th International Conference on, 2016, pp. 56-63: IEEE.
 F. Amiri, M. R. Yousefi, C. Lucas, A. Shakery, and N. Yazdani, "Mutual information-based feature selection for intrusion detection systems," Journal of Network and Computer Applications, vol. 34, no. 4, pp. 1184-1199, 2011.
 T. Mehmood and H. B. M. Rais, "SVM for network anomaly detection using ACO feature subset," in Mathematical Sciences and Computing Research (iSMSC), International Symposium on, 2015, pp. 121-126: IEEE.
 A. D. Landress, "A hybrid approach to reducing the false positive rate in unsupervised machine learning intrusion detection," in SoutheastCon, 2016, 2016, pp. 1-6: IEEE.
 L. Rokach and O. Maimon, "Data Mining With Decision Trees: Theory and Applications," 2014.
 L. Li Zhong, Z. Ya Ming, and Z. Yu Bin, "Network intrusion detection method by least squares support vector machine classifier," in Computer Science and Information Technology (ICCSIT), Chengdu 2010.
 L. L. Zhong, Z. Y. Ming, and Z. Y. Bin, "Network intrusion detection method by least squares support vector machine classifier," in Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on, 2010, vol. 2, pp. 295-297: IEEE.
 M. Kuhn and K. Johnson, Applied predictive modeling. Springer, 2013.
 T. Janarthanan and S. Zargari, "Feature selection in UNSW-NB15 and KDDCUP'99 datasets," in Industrial Electronics (ISIE), 2017 IEEE 26th International Symposium on, 2017, pp. 1881-1886: IEEE.
 N. Moustafa and J. Slay, "The significant features of the UNSW-NB15 and the KDD99 data sets for Network Intrusion Detection Systems," in Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), 2015 4th International Workshop on, 2015, pp. 25-31: IEEE.