H. Lu and J. Xu, Three-Level Hybrid Intrusion Detection System, 2009 International Conference on Information Engineering and Computer Science
DOI : 10.1109/ICIECS.2009.5366474

D. J. Brown, B. Suckow, and T. Wang, A Survey of Intrusion Detection Systems

T. Hlaing, Feature Selection and Fuzzy Decision Tree for Network Intrusion Detection, International Journal of Informatics and Communication Technology (IJ-ICT), vol.1, issue.2, pp.109-118, 2012.
DOI : 10.11591/ij-ict.v1i2.591

N. B. Amor, S. Benferhat, and Z. Elouedi, Naive Bayes vs decision trees in intrusion detection systems, Proceedings of the 2004 ACM symposium on Applied computing , SAC '04, p.420424, 2004.
DOI : 10.1145/967900.967989

I. Lindsay, Smith: A tutorial on Principal Components Analysis, 2002.

L. Zhao, H. Kang, and S. Kim, Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction, Information and Communication Technology Lecture Notes in Computer, vol.7804, pp.490-495, 2013.
DOI : 10.1007/978-3-642-36818-9_55

URL : https://hal.archives-ouvertes.fr/hal-01480208

J. R. Quinlan, Induction of decision trees, Machine Learning, pp.81-106, 1986.
DOI : 10.1007/BF00116251

J. R. Quinlan, Improved Use of Continuous Attributes in C4, Journal of Artifcial Intelligence Research, vol.5, issue.3, pp.77-9096, 1996.

Y. Kumar and J. , Upendra: An Efficient Intrusion Detection Based on Decision Tree Classifier Using Feature Reduction, International Journal of Scientific and Research Publications, vol.2, issue.1, 2012.

S. Ruggieri, Efficient C4.5, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, vol.14, issue.2, 2002.