@incollection{, D739A122886B7342094DCAB3BC02B23A , author={{C.Kavitha} and {Dr.K.Iyakutti} and {Pasumpon Muthuramalinga Thevar College,Usilampatti, Madurai}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1473137 } @incollection{b0, , title={{Genetic Algorithm Approach for Risk Reduction of Information Security}} , author={{ AlirezaTamjidyamcholo } and { Rawaa Dawoud Al-Dabbagh }} , journal={{International Journal of Cyber-Security and Digital Forensics (IJCSDF)}} 1 1 , year={2012} } @incollection{b1, , title={{Evolutionary Approach for Network Anomaly Detection Using Effective Classification}} , author={{ AChandrasekar } and { VVasudevan } and { PYogesh }} , journal={{IJCSNS International Journal of Computer Science and Network Security}} 9 1 , year={January 2009} } @incollection{b2, , title={{A Survey of Evolutionary Algorithms for Decision Tree Induction}} , author={{ RodrigoCBarros } and { PM´arcio } and { Basgalupp } and { CP L FAndr´e } and { AlexADe Carvalho } and { Freitas }} , booktitle={{IEEE transactions on systems, man, and cybernetics -part c: applications & reviews}} , year={2012} 3 } @incollection{b3, , title={{Importance of Intrusion Detection System}} , author={{ AsmaaShaker Ashoor } and { SharadGore }} , journal={{International Journal of Scientific & Engineering Research}} 2 1 , year={January-2011} } @incollection{b4, , title={{Abdul-kader, A hybrid approach for efficient anomaly detection using metaheuristic methods}} , author={{ FTamer } and { WailSGhanema } and { Elkilani } and { MHatem }} , journal={{Journal of Advanced Research}} , year={March 2014} } @incollection{b5, , title={{Anomaly Detection in Computer Security and an Application to File System Accesses}} , author={{ SalvatoreJStolfo } and { ShlomoHershkop } and { LinhHBui } and { RyanFerster } and { KeWang }} , booktitle={{SMIS 2005}} , booktitle={{LNAI}} , year={2005} 3488 } @incollection{b6, , title={{Anomaly Detection : A Survey}} , author={{ VarunChandola } and { ArindamBanerjee } and { VipinKumar }} , journal={{ACM Computing Surveys}} 41 3 15 , year={July 2009} } @incollection{b7, , title={{}} , journal={{Jonathon Shlens, A Tutorial on Principal Component Analysis}} , year={April 7. 2014} , note={Version 3.02} } @book{b8, , title={{Dynamic Security Risk Management Using Bayesian Attack Graphs, IEEE Transaction on Dependable and secure computing}} , author={{ NayotPoolsappasit } and { RinkuDewri } and { IndrajitRay }} , year={Jan 2012} } @incollection{b9, , title={{Information Security Risk Analysis Methods and Research Trends: AHP and Fuzzy Comprehensive Method}} , author={{ Ming-ChangLee }} , journal={{International Journal of Computer Science & Information Technology (IJCSIT)}} 6 , year={February 2014} } @incollection{b10, , title={{Information security risk assessment based on grey relational decision making algorithm}} , author={{ YGao } and { JZLuo }} , journal={{Journal of Southeast University}} 39 2 , year={2009} } @incollection{b11, , title={{Research on the technology of quantitative security evaluation based on fuzzy number arithmetic operation}} , author={{ FLiu } and { KDai } and { ZYWang }} , booktitle={{Fuzzy Systems and Mathematics}} 18 4 , year={2004} } @incollection{b12, , title={{Applying the fuzzy weighted average approach to evaluation network security systems}} , author={{ PTChang } and { KHung } and { C }} , booktitle={{Computers and Mathematic s with Application}} 49 , year={2005} } @incollection{b13, , title={{An information systems security risk assessment model under uncertain environment}} , author={{ NFeng } and { MLi }} , journal={{Applied Soft Computer}} 11 7 , year={2011} } @incollection{b14, , title={{The use AHP in security policy decision making: An open office calc application}} , author={{ ISyamsuddin } and { JHwang }} , journal={{Journal of Software}} 5 10 , year={2010} } @incollection{b15, , title={{Evaluation of strategic information security with fuzzy AHP method}} , author={{ ISyamsuddin }} , journal={{American Journal of Intelligence Systems}} 2 1 , year={2012} } @incollection{b16, , title={{Comparative Study of Decision Tree Classifier with and without GA based feature selection}} , author={{ ShantaRangaswamy } and { DrShobha } and { GSandeep R V, } and { RajKiran }} , journal={{International Journal of Advanced Research in Computer and Communication Engineering}} 3 1 , year={January 2014} } @book{b17, , title={{Encyclopedia of Research Design}} , author={{ HerveAbdi }} , editor={Neil Salkind} , year={2010} , publisher={Sage} , address={Thousand Oaks, CA} , note={Normalizing Data} } @incollection{b18, , title={{Feature Reduction using Principal Component Analysis for Effective Anomaly-Based Intrusion Detection on NSL-KDD}} , author={{ ,Shilpa Lakhina } and { SiniJoseph } and { BhupendraVerma }} , journal={{International Journal of Engineering Science and Technology}} 2 6 , year={2010} }