REFERENCES
Baker, J. E., (1987). Reducing bias and inefficiency in the
selection algorithm. 2nd International Conference on
Genetic Algorithms on Genetic algorithms and their
application, MIT, Massachusetts.
Bankovic, Z., Stepanovic, D., Bojanic, S., and Nieto-
Taladriz, O., (2007). Improving network security
using genetic algorithm approach. Computers and
Electrical Engineering, 33(5-6), 438-451. doi:
10.1016/j.compeleceng.2007.05.010.
De Jong, K. A., (1993). Genetic algorithms are NOT
function optimizers. FOGA-92, 2nd workshop on
Foundations of Genetic Algorithms, Vail, Colorado.
Gong, R. H., Zulkernine, M., and Abolmaesumi, P.
(2005). A software implementation of a genetic
algorithm based approach to network intrusion
detection. Sixth International Conference on Software
Engineering, Artificial Intelligence, Networking and
Parallel/Distributed Computing, and First ACIS
International Workshop on Self-Assembling Wireless
Networks., 246-253. doi: 10.1109/SNPD-
SAWN.2005.9.
Haddadi, F., Khanchi, S., Shetabi, M., and Derhami, V.,
(2010). Intrusion Detection and Attack Classification
Using Feed-Forward Neural Network. Second
International Conference on Computer and Network
Technology, Bangkok.
Holland, J. H., (1975). Adaptation in natural and artificial
systems : an introductory analysis with applications to
biology, control, and artificial intelligence. Ann
Arbor, Mich.: University of Michigan Press.
Hua, J., and Xiaofeng, Z., (2008). Study on the network
intrusion detection model based on genetic neural
network. International Workshop on Modelling,
Simulation and Optimization, Hong Kong.
Karygiannis, T., and Owens, L., (2002). Wireless network
security. NIST special publication, 800, 48.
Landau, L. G., and Taylor, J. G., (1997). Concepts for
neural networks: A survey: Springer-Verlag New
York, Inc.
Levine, D., (1997). Commentary—Genetic Algorithms: A
Practitioner's View. INFORMS Journal on Computing,
9(3), 256-259.
Li, W., (2004). Using genetic algorithm for network
intrusion detection. United States Department of
Energy Cyber Security Group 2004 Training
Conference, Kansas City, Kansas.
Lindley, D. V., (1987). Regression and correlation
analysis. New Palgrave: A Dictionary of Economics,
4, 120-123. doi: 10.1057/9780230226203.3411.
MathWorks, (2012). Post-Training Analysis (Network
Validation): Multilayer Networks and
Backpropagation Training (Neural Network
Toolbox™) Retrieved 10 May, 2012, from
http://www.mathworks.co.uk/help/toolbox/nnet/ug/bss
3318-1.html.
Moore, A. W., (2001). Cross-validation for detecting and
preventing overfitting Retrieved 10 May, 2012, from
http://www.autonlab.org/tutorials/overfit10.pdf.
Pillai, M. M., Eloff, J. H. P., and Venter, H. S., (2004). An
approach to implement a network intrusion detection
system using genetic algorithms. South African
Institute for Computer Scientists and Information
Technologists on IT research in developing countries,
Republic of South Africa.
Ratnayake, D., Kazemian, H., Yusuf, S., and Abdullah, A.,
(2011). An Intelligent Approach to Detect Probe
Request Attacks in IEEE 802.11 Networks.
Engineering Applications of Neural Networks, Corfu,
Greece.
Reeves, C. R., and Rowe, J. E. (2003). Genetic
algorithms: principles and perspectives: a guide to GA
theory (Vol. 20): Springer.
Wu, S. X., and Banzhaf, W., (2010). Review: The use of
computational intelligence in intrusion detection
systems: A review. Appl. Soft Comput., 10(1), 1-35.
doi: 10.1016/j.asoc.2009.06.019.
Xia, T., Qu, G., Hariri, S., and Yousif, M., (2005). An
efficient network intrusion detection method based on
information theory and genetic algorithm. 24th IEEE
International Performance, Computing, and
Communications Conference, 2005, Phoenix, Arizona.
Yao, X. H., (2010). A network intrusion detection
approach combined with genetic algorithm and back
propagation neural network. International Conference
on E-Health Networking, Digital Ecosystems and
Technologies, Shenzhen.
Zhang, Y., Zheng, J., and Ma, M., (2008). Handbook of
research on wireless security: Information Science
Reference-Imprint of: IGI Publishing.
SECRYPT2012-InternationalConferenceonSecurityandCryptography
350