[1] Dicholkar S. V.,Sekhar D.,Review-IoT Security D.,Vadis D. .2020 .. , 9318641 : .
[2] Siddiqi M. A.,Pak W.,Dec W. .2020 .Optimizing Filter-Based Feature Selection Method Flow for Intrusion Detection System,” Electronics. , 9(12) : 2114.
[3] Sen R.,Goswami S.,Mandal A. K.,Chakraborty B. .2022 .An effective feature subset selection approach based on Jeffries-Matusita distance for multiclass problems. ” Journal of Intelligent & Fuzzy Systems, 42(4) : 4173-4190.
[4] Sharma B.,Sharma L.,Lal C.,Roy S.,Apr S. .2023 .Anomaly based network intrusion detection for IoT attacks using deep learning technique,” Computers and Electrical Engineering. , 108626 : 108626.
[5] Mohammadi S.,Mirvaziri H.,Ghazizadeh-Ahsaee M.,Karimipour H. .2018 .Cyber intrusion detection by combined feature selection algorithm. ” Journal of Information Security and Applications, 11 : 80-88.
[6] Gupta N.,Jindal V.,Bedi P.,Jan P. .2021 .CSE-IDS: Using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems. ” Computers & Security, 102499 : 102499.
[7] Taher K. A.,B. K. A.,Rahman Md. M. .2019 .Network Intrusion Detection using Supervised Machine Learning Technique with Feature Selection. Electrical and Signal Processing Techniques (ICREST), 8644161 : .
[8] Leevy J. L.,Hancock J.,Zuech R.,Khoshgoftaar T. M.,Feb T. M. .2021 .Detecting cybersecurity attacks across different network features and learners. ” Journal of Big Data, 8(1) : .
[9] T.-C. Vuong H.,Tran M. X.,Trang M. X.,-D. Ngo T. V.,Luong T. V. .2022 .A Comparison of Feature Selection and Feature Extraction in Network Intrusion Detection Systems. Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), 9979923 : .
[10] Sharma M.,Elmiligi H.,Gebali F. .2021 .A Novel Intrusion Detection System for RPL-Based Cyber-Physical Systems,”. IEEE Canadian Journal of Electrical and Computer Engineering, 3053231(2) : 246-252.
[11] Desai R. .2023 .Network Intrusion Detection Through Machine Learning With Efficient Feature Selection,” 2023 15th International Conference on COMmunication Systems & NETworkS (COMSNETS. , 10041315 : .
[12] Chandra A.,Khatri S. K.,Simon R. .2019 .Filter-based Attribute Selection Approach for Intrusion Detection using k-Means Clustering and Sequential Minimal Optimization Techniq. 2019 Amity International Conference on Artificial Intelligence (AICAI), 8701373 : .
[13] Zuech R.,Hancock J.,Khoshgoftaar T. M.,Dec T. M. .2022 .A new feature popularity framework for detecting cyberattacks using popular features. ” Journal of Big Data, 9(1) : .
[14] Sayed M. S. E.,Le-Khac N.-A.,Azer M. A.,Jurcut A. D. .2022 .A Flow-Based Anomaly Detection Approach With Feature Selection Method Against DDoS Attacks in SDNs,”. IEEE Transactions on Cognitive Communications and Networking, 3186331(4) : 1862-1880.
[15] Ullah I.,Mahmoud Q. H.,International IEEE .2017 .Conference on Big Data (Big Data). Dec, 8258163 : .
[16] Kasongo S. M.,Sun Y.,Nov Y. .2020 .Performance Analysis of Intrusion Detection Systems Using a Feature Selection Method on the UNSW-NB15 Dataset,”. Journal of Big Data, 7(1) : .
[17] Alhowaide A.,I. Alsmadi A.,Tang J.,International IEEE,IOT IEEE .2020 .Random-Forest and Pearson Correlation for Dimensionality Reduction in IoT IDS. , 9216388 : .
[18] Binbusayyis A.,Vaiyapuri T.,Jul T. .2020 .Comprehensive analysis and recommendation of feature evaluation measures for intrusion detection. ” Heliyon, 6(7) : e04262.
[19] Husain A.,Salem A.,Jim C. .2019 .Development of an Efficient Network Intrusion Detection Model Using Extreme Gradient Boosting (XGBoost) on the UNSW-NB15 Dataset. 2019 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 9001867 : .
[20] Urbanowicz R. J.,Meeker M.,La W.,Cava W.,Olson R. S.,Moore J. H. .2018 .Relief-based feature selection: Introduction and review. ” Journal of Biomedical Informatics, 07 : 189-203.
[21] Spolaor N.,Cherman E. A.,Monard M. C.,Lee H. D. .2013 .ReliefF for Multi-label Feature Selection. 2013 Brazilian Conference on Intelligent Systems, 10 : .
[22] Hammad M.,Ismail Y. .2020 .Intrusion Detection System using Feature Selection With Clustering and Classification Machine Learning Algorithms on the UNSW-NB15 dataset. 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT), 9312002 : .
[23] K. M. Shazzad .2005 .Optimization of Intrusion Detection through Fast Hybrid Feature Selection,”. Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05), 181 : .
[24] Quinlan J. R. .1986 .Induction of decision trees. ” Machine Learning, 1(1) : 81-106.
[25] Dicholkar S.,Nirmal J. H. .2023 .Comparative Analysis of Resampling Techniques on Imbalanced CIE-CICIDS2018 Dataset for DoS Attack Detection”. J. of Data Acquisition and Processing, 38(3) : 2249-2260.