[1] M. G. Ball, B. Qela and S. Wesolkowski, “A Review of the Use of Computational Intelligence in the Design of Military Surveillance Networks,” Recent Advances in Computational Intelligence in Defense and Security, vol. 621, pp. 663-693, Dec. 2015.
[2] D. He, N. Kumar, J. Chen, C. C. Lee and N. Chilamkurti, “Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks,” Multimedia Systems, vol. 21, no. 1, pp. 49–60, Feb. 2015.
[3] M. Li and H. J. Lin, “Design and Implementation of Smart Home Control Systems Based on Wireless Sensor Networks and Power Line Communications,” IEEE Transactions on Industrial Electronics, vol. 62, no.7, pp. 4430–4442, July 2015.
[4] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, “A survey on sensor networks,” IEEE Communications Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002.
[5] J. Sen, “A Survey on Wireless Sensor Network Security,” International Journal of Communication Networks and Information Security (IJCNIS), vol. 1, no. 2, pp. 55-78, Aug. 2009.
[6] Y. Zhou, Y. Fang, and Y. Zhang, “Securing wireless sensor networks: a survey,” IEEE Communications Surveys and Tutorials, vol. 10, no. 3, pp. 6–28, Third Quarter 2008.
[7] M. Sadeghizadeh, O. R. Marouzi, “A Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks”, Journal of Communication Engineering, vol. 7, no. 2, July-Dec. 2018.
[8] M. Ehdaie, N. Alexiou and P. Papadimitratos, “Random Key Pre-Distribution Techniques against Sybil Attacks,” Journal of Communication Engineering, vol. 5, no. 1, pp. 1-13, Jan.-June 2016.
[9] I. Q. Kolagar, H. H. S. Javadi and S. Bijani, “A Deterministic Multiple Key Space Scheme for Wireless Sensor Networks via Combinatorial Designs,” Journal of Communication Engineering, vol. 6, no. 1, pp. 53-70, Jan.-June 2017.
[10] I. Butun, S. D. Morgera, and R. Sankar, “A Survey of Intrusion Detection Systems in Wireless Sensor Networks,” IEEE Communications Surveys and Tutorials, vol. 16, no. 1, pp. 266-282, First Quarter 2014.
[11] A. Ghosal and S. Halder, “A survey on energy efficient intrusion detection in wireless sensor networks,” Journal of Ambient Intelligence and Smart Environments, vol. 9, no. 2, pp. 239-261, Feb. 2017.
[12] S. Duhan and P. Khandnor, “Intrusion detection system in wireless sensor networks: A comprehensive review,” 2016 International Conf. on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai, 2016, pp. 2707-2713.
[13] N. A. Alrajeh, S. Khan, and B. Shams, “Intrusion Detection Systems in Wireless Sensor Networks: A Review,” International Journal of Distributed Sensor Networks, vol. 2013, no. 4, pp. 1-7, May 2013.
[14] A. Abduvaliyev, S. K. Pathan, J. Zhou, R. Roman, and W. C. Wong, “On the Vital Areas of Intrusion Detection systems in Wireless Sensor Networks,” IEEE Communications Surveys and Tutorials, vol. 15, no. 3, pp. 1223-1237, Third Quarter 2013.
[15] C. Elkan, “Results of the KDD’99 classifier learning,” ACM SIGKDD Explorations Newsletter, vol. 1, no. 2, pp. 63-64, Jan. 2000.
[16] P. Aggarwal and S. K. Sharma, “Analysis of KDD Dataset Attributes - Class wise For Intrusion Detection,” Procedia Computer Science, vol. 57, pp. 842-851, Dec. 2015.
[17] S. K. Sahu, S. Sarangi, and S. K. Jena, “A detail analysis on intrusion detection datasets,” 2014 IEEE International Advance Computing Conference (IACC), Gurgaon, 2014, pp. 1348-1353.
[18] M. M. Ozcelik, E. Irmak, and S. Ozdemir, “A hybrid trust based intrusion detection system for wireless sensor networks,” 2017 International Symposium on Networks, Computers and Communications, Marrakech, 2017, pp. 1-6.
[19] S. S. Wang, K. Q. Yan, S. C. Wang, and C. W. Liu, “An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks,” Expert Systems with Applications, vol. 38, no. 12, pp. 15234-15243, Dec. 2011.
[20] Y. Maleh, A. Ezzati, Y. Qasmaoui, and M. Mbida, “A Global Hybrid Intrusion Detection System for Wireless Sensor Networks,” Procedia Computer Science, vol. 52, pp. 1047-1052, June 2015.
[21] H. Sedjelmaci and M. Feham, “Novel hybrid intrusion detection system for clustered wireless sensor networks” International Journal of Network Security & Its Applications (IJNSA), vol. 3, no. 4, pp. 1-14, Aug. 2011.
[22] W. Xingzhu, “ACO and SVM Selection Feature Weighting of Network ntrusion Detection Method,” International Journal of Security and Its Applications, vol. 9, no. 4, pp. 129-270, Apr. 2015.
[23] M. Aslahi-Shahri, R. Rahmani, M. Chizari, A. Maralani, M. Eslami, M.J. Golker, and A. Ebrahimi, “A hybrid method consisting of GA and SVM for intrusion detection system,” Neural computing and applications, vol. 27, no. 6, pp. 1669–1676, Aug. 2016.
[24] N. Acharya and S. Singh, “An IWD-based feature selection method for intrusion detection system,” Soft Computing, vol. 22, no. 13, pp. 4407-4416, July 2018.
[25] R. Kaur, M. Sachdeva, and G. Kumar, “Nature Inspired Feature Selection Approach for Effective Intrusion Detection,” Indian Journal of Science and Technology, vol. 9, no. 42, pp. 1-9, Nov. 2016.
[26] S. Ramakrishnan and S. Devaraju, “Attack's feature selection-based network intrusion detection using fuzzy control language,” International journal of fuzzy systems, vol. 19, no. 2, pp. 316–328, Apr. 2017.
[27] Y. Zhu, J. Liang, J. Chen, and Z. Ming, “An improved NSGA-III algorithm for feature selection used in intrusion detection,” Knowledge-Based Systems, vol. 116, pp. 74-85, Jan. 2017.
[28] H. Qu, Z. Qiu, X. Tang, M. Xiang, and P. Wang, “An Adaptive Intrusion Detection Method for Wireless Sensor Networks,” International Journal of Advanced Computer Science and Applications(IJACSA), vol. 8, no. 11, pp. 27-36, Jan. 2017.
[29] S. Rajasegarar, C. Leckie, and M. Palaniswami, “Anomaly detection in wireless sensor networks,” IEEE Wireless Communications, vol. 15, no. 4, pp. 34-40, Aug. 2008.
[30] W. Wang, X. Zhang, S. Gombault and S. J. Knapskog, "Attribute Normalization in Network Intrusion Detection," 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks, Kaohsiung, 2009, pp. 448-453.
[31] E. Frank, I. H. Witten, “Generating Accurate Rule Sets Without Global Optimization”, 1998 Fifteenth International Conference on Machine Learning, San Francisco, 1998, pp. 144-151.