Garzia, Fabio; Lombardi, Mara; Ramalingam, Soodamani (2017). "An integrated internet of everything — Genetic algorithms controller — Artificial neural networks framework for security/Safety systems management and support". 2017 International Carnahan Conference on Security Technology (ICCST). IEEE. pp. 1–6. doi:10.1109/ccst.2017.8167863. ISBN9781538615850. S2CID19805812.
Vilela, Douglas W. F. L.; Lotufo, Anna Diva P.; Santos, Carlos R. (2018). "Fuzzy ARTMAP Neural Network IDS Evaluation applied for real IEEE 802.11w data base". 2018 International Joint Conference on Neural Networks (IJCNN). IEEE. pp. 1–7. doi:10.1109/ijcnn.2018.8489217. hdl:11449/187060. ISBN9781509060146. S2CID52987664.
Dias, L. P.; Cerqueira, J. J. F.; Assis, K. D. R.; Almeida, R. C. (2017). "Using artificial neural network in intrusion detection systems to computer networks". 2017 9th Computer Science and Electronic Engineering (CEEC). IEEE. pp. 145–150. doi:10.1109/ceec.2017.8101615. ISBN9781538630075. S2CID24107983.
Nti, Isaac Kofi; Nyarko-Boateng, Owusu; Adekoya, Adebayo Felix; Arjun, R (December 2021). "Network Intrusion Detection with StackNet: A phi coefficient Based Weak Learner Selection Approach". 2021 22nd International Arab Conference on Information Technology (ACIT). pp. 1–11. doi:10.1109/ACIT53391.2021.9677338. ISBN978-1-6654-1995-6. S2CID246039483.
Viegas, E.; Santin, A. O.; Fran?a, A.; Jasinski, R.; Pedroni, V. A.; Oliveira, L. S. (2017-01-01). "Towards an Energy-Efficient Anomaly-Based Intrusion Detection Engine for Embedded Systems". IEEE Transactions on Computers. 66 (1): 163–177. Bibcode:2017ITCmp..66..163V. doi:10.1109/TC.2016.2560839. ISSN0018-9340. S2CID20595406.
França, A. L.; Jasinski, R.; Cemin, P.; Pedroni, V. A.; Santin, A. O. (2015-05-01). "The energy cost of network security: A hardware vs. Software comparison". 2015 IEEE International Symposium on Circuits and Systems (ISCAS). pp. 81–84. doi:10.1109/ISCAS.2015.7168575. ISBN978-1-4799-8391-9. S2CID6590312.
França, A. L. P. d; Jasinski, R. P.; Pedroni, V. A.; Santin, A. O. (2014-07-01). "Moving Network Protection from Software to Hardware: An Energy Efficiency Analysis". 2014 IEEE Computer Society Annual Symposium on VLSI. pp. 456–461. doi:10.1109/ISVLSI.2014.89. ISBN978-1-4799-3765-3. S2CID12284444.
Vilela, Douglas W. F. L.; Lotufo, Anna Diva P.; Santos, Carlos R. (2018). "Fuzzy ARTMAP Neural Network IDS Evaluation applied for real IEEE 802.11w data base". 2018 International Joint Conference on Neural Networks (IJCNN). IEEE. pp. 1–7. doi:10.1109/ijcnn.2018.8489217. hdl:11449/187060. ISBN9781509060146. S2CID52987664.
Garzia, Fabio; Lombardi, Mara; Ramalingam, Soodamani (2017). "An integrated internet of everything — Genetic algorithms controller — Artificial neural networks framework for security/Safety systems management and support". 2017 International Carnahan Conference on Security Technology (ICCST). IEEE. pp. 1–6. doi:10.1109/ccst.2017.8167863. ISBN9781538615850. S2CID19805812.
Vilela, Douglas W. F. L.; Lotufo, Anna Diva P.; Santos, Carlos R. (2018). "Fuzzy ARTMAP Neural Network IDS Evaluation applied for real IEEE 802.11w data base". 2018 International Joint Conference on Neural Networks (IJCNN). IEEE. pp. 1–7. doi:10.1109/ijcnn.2018.8489217. hdl:11449/187060. ISBN9781509060146. S2CID52987664.
Dias, L. P.; Cerqueira, J. J. F.; Assis, K. D. R.; Almeida, R. C. (2017). "Using artificial neural network in intrusion detection systems to computer networks". 2017 9th Computer Science and Electronic Engineering (CEEC). IEEE. pp. 145–150. doi:10.1109/ceec.2017.8101615. ISBN9781538630075. S2CID24107983.
Nti, Isaac Kofi; Nyarko-Boateng, Owusu; Adekoya, Adebayo Felix; Arjun, R (December 2021). "Network Intrusion Detection with StackNet: A phi coefficient Based Weak Learner Selection Approach". 2021 22nd International Arab Conference on Information Technology (ACIT). pp. 1–11. doi:10.1109/ACIT53391.2021.9677338. ISBN978-1-6654-1995-6. S2CID246039483.
Viegas, E.; Santin, A. O.; Fran?a, A.; Jasinski, R.; Pedroni, V. A.; Oliveira, L. S. (2017-01-01). "Towards an Energy-Efficient Anomaly-Based Intrusion Detection Engine for Embedded Systems". IEEE Transactions on Computers. 66 (1): 163–177. Bibcode:2017ITCmp..66..163V. doi:10.1109/TC.2016.2560839. ISSN0018-9340. S2CID20595406.
França, A. L.; Jasinski, R.; Cemin, P.; Pedroni, V. A.; Santin, A. O. (2015-05-01). "The energy cost of network security: A hardware vs. Software comparison". 2015 IEEE International Symposium on Circuits and Systems (ISCAS). pp. 81–84. doi:10.1109/ISCAS.2015.7168575. ISBN978-1-4799-8391-9. S2CID6590312.
França, A. L. P. d; Jasinski, R. P.; Pedroni, V. A.; Santin, A. O. (2014-07-01). "Moving Network Protection from Software to Hardware: An Energy Efficiency Analysis". 2014 IEEE Computer Society Annual Symposium on VLSI. pp. 456–461. doi:10.1109/ISVLSI.2014.89. ISBN978-1-4799-3765-3. S2CID12284444.
Bace, Rebecca Gurley; Mell, Peter (2001). Intrusion detection systems. [U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology]. OCLC70689163.