@incollection{, 7AD1E6E42AD5D89B8E84A63639C05DE0 , author={{Berlin H. LekagningK Djionang} and {Dr. GilbertTindo} and {University of Yaound I}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1713947 } @incollection{b0, , title={{Feature selection and architecture optimization in connectionist system}} , author={{ Yacoub & YounesMeziane } and { Bennami }} , journal={{International journal of Neural Systems}} 10 5 , year={2000} } @incollection{b1, , title={{Discriminant Anlysis based feature Selection in KDD Intrusion Dataset}} , author={{ SSiva }} , journal={{International Journal of Computer Application}} 31 11 , year={october 2011} } @book{b2, , title={{Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets}} , author={{ HGünes }} } @incollection{b3, , title={{A New Method for Detecting Network Intrusion by Using a combinaison of Genetic and Support Vector Machine}} , author={{ Behrooz Mabadi }} , journal={{Journal Of Engineering and Applied Science}} 11 4 , year={2016} } @incollection{b4, , title={{Feature Selection for Intrusion Detection using NS L-KDD}} , author={{ HChae } and { BOJo } and { SHChoi } and { TKPark }} , journal={{Recent Advances in Computer Science}} , year={2013} } @incollection{b5, , title={{Intrusion detection using an ensemble of intelligent paradigms}} , author={{ SrinivasMukkamala } and { &&All }} , journal={{Journal Network and Computer Applications}} 28 , year={2005} } @book{b6, , title={{A Machine Learning Approach to Detecting Attacks by Identifying Anomalies in Network Traffic}} , author={{ MatthewVincent Mahoney }} , year={May 2003} Florida Institute of Technology } @incollection{b7, , title={{A Detailed Analysis of the KDD CUP 99 Data Set}} , author={{ MahbodTavallaee } and { &&All }} , booktitle={{Proceding of the 2009 IEEE Symposium on Computational Intelligence in Security and Defense Application}} eding of the 2009 IEEE Symposium on Computational Intelligence in Security and Defense Application , year={CISDA 2009} } @incollection{b8, , title={{Protocole Type Based Intrusion Detection Using RBF Neural Network}} , author={{ AslihanOzkaya } and { &Bekir Karlik }} , journal={{International Journal of Artificial Intelligence and Expert Systems}} 3 2012 } @incollection{b9, , title={{Towards A New Architecture of Detecting Networks Intrusion Based on Neural Network}} , author={{ GBhl Djionang } and { Tindo }} , journal={{International Journal of Computer Networks and Communications Security}} 5 1 , year={2017} } @incollection{b10, , title={{Network Intrusion Detection Systems based Neural Network:A Comparative Study}} , author={{ LekagningBerlin } and { GilbertDjionang } and { Tindo }} , journal={{International Journal of Computer Applications}} 157 5 , year={January 2017} } @incollection{b11, , author={{ PhilippeLeray } and { Gallinari «Patrick }} , booktitle={{Feature Selection with Neural Networks}} , year={1998} 26 } @book{b12, , title={{Segmentation d'images par morphologie mathématique et classification de données par réseaux de neurones : Application a la classification de cellules en cytologie des séreuses}} , author={{ OlivierLezoray } and { « }} , year={2000} , address={UNIVERSITE de CAEN/BASSE-NORMANDIE janvier} } @book{b13, , title={{sélection et extraction d'attributs pour les problèmes de classification" THESE UNIVERSITE de LILLE janvier}} , author={{ ELSaba } and { Ferchichi }} , year={2013} } @book{b14, , title={{Feature selection for classification. Intelligent Data Analysis}} , author={{ MDash } and { HLiu }} , year={1997} 1 } @book{b15, , title={{José Crispín HERNÁNDEZHERNÁNDEZ « Algorithmes métaheuristiques hybrides pour la sélection de gènes et la classification de données de biopuces » THESE UNIVERSITE de ANGERS novembre}} , year={2008} } @book{b16, , title={{sélection et extraction d'attributs pour les problèmes de classification" THESE UNIVERSITE de LILLE janvier}} , author={{ ELSaba } and { Ferchichi }} , year={2013} } @incollection{b17, , title={{An introduction to variable and feature selection}} , author={{ IGuyon } and { AElisseeff }} , journal={{Journal of Machine Learning Research}} 3 998 , year={2003. October} } @incollection{b18, , title={{Artificial Neural Networks for Misuse Detection}} , author={{ JamesCanady }} , booktitle={{Proceedings, National Information Systems Security Conference (NISSC )}} National Information Systems Security Conference (NISSC ) 98 } @incollection{b19, , title={{les réseaux de neurones}} , author={{ GDreyfus }} , journal={{Mécanique Industriel et Matériaux}} 51 , year={1998} , note={septembre} } @incollection{b20, , title={{Intruision recognition using neural networks}} , author={{ VladimirGolovko } and { PavelKochurko }} , journal={{International Scientific Journal of computing}} 4 , year={2005} } @incollection{b21, , title={{On Attack-Relevant Ranking of Network Features}} , author={{ AdelAmmar } and { KhaledAl-Shalfan }} , journal={{IJACSA) International Journal of Advanced Computer Science and Applications}} 6 11 , year={2015} }