@incollection{, 70B235429750204C090B02C1491D1664 , author={{OlasehindeOlayemi}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}2213744 } @book{b0, , title={{On Cyberwarfare, DCAF Horizon}} , author={{ FSchreier }} , year={2015. 2015. Accessed 2 nd April, 2021} } @incollection{b1, , title={{Survey on Data Mining Techniques for Intrusion Detection System}} , author={{ PKavita } and { DPranjali }} , journal={{International Journal of Research Studies in Science, Engineering and Technology}} 1 1 , year={April 2014} } @incollection{b2, , title={{An Introduction to Variable and Feature Selection}} , author={{ GIsabelle } and { AndreE }} , journal={{Journal of Machine Learning Research}} 3 , year={2003} } @incollection{b3, , title={{Reduced Features Intrusion Detection Systems Classification Accuracy Improvement}} , author={{ OOOlasehinde } and { KWilliams } and { BOAdegoke }} 10.1023/A:1006624031083 , journal={{International Journal of Scientific & Engineering Research}} 10 12 , year={2019. 2019} } @book{b4, , title={{Analysis of Security Techniques for Detecting Suspicious Activities and Intrusion Detection in Network Traffic. Semantic Scholar. 2012https:// www.semanticscholar.org/paper/Analysis-of-Securit y-Techniques-for-Detecting-and-Tariq-Arshad}} , author={{ WTariq } and { MArshad } and { MSaqib } and { NGul }} , year={2012} , note={a993 dab8bcd79ec8468c36489e2acabf957b71d0#citing -papers} } @book{b5, , title={{}} , author={{ PGogoi } and { MHBhuyan } and { DKBhattacharyya }} } @incollection{b6, , title={{Packet and Flow Based Network Intrusion Dataset}} , author={{ JKKalita }} 10.1007/978-3-642-32129-0_34 , journal={{Communications in Computer and Information Science}} , year={2012. 2012} } @incollection{b7, , title={{Feature Ranking, Selection and Discretization}} , author={{ WDuch } and { TWiniarski } and { JBiesiada }} , booktitle={{Int. Conf. on Artificial Neural Networks (ICANN) and Int. Conf. on Neural Information Processing (ICONIP)}} , year={2003. 2003} } @incollection{b8, , title={{Efficient detection of DDoS attacks with important attributes}} , author={{ WWang } and { GombaultS }} , booktitle={{the 3rd IEEE International conference on Risks and Security of Internet and Systems (CRiSIS'08)}} Tozeur, Tunisia , year={2008} } @book{b9, , title={{Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing, journal of wireless communication and networking}} , author={{ OOpeyemi } and { RCKim-Kwang } and { DAli } and { XZheng } and { Mqhele }} 10.1186/s13638-016-0623-3 , year={2016. 2016} } @incollection{b10, , title={{A new dependency and correlation analysis for features}} , author={{ GQu } and { SHariri } and { MYousif }} 10.1109/TKDE.2005.136 , journal={{IEEE Transactions on Knowledge and Data Engineering}} 17 9 , year={Sept. 2005} } @incollection{b11, , title={{The dimensionality of program complexity}} , author={{ JCMunson } and { TMKhoshgoftaar }} , booktitle={{Proceedings of the 11th international conference on Software engineering, ICSE '89}} the 11th international conference on Software engineering, ICSE '89 , publisher={ACM} , year={1989} } @incollection{b12, , title={{A survey on feature selection methods}} , author={{ GirishChandrashekar } and { FeratSahin }} , journal={{Computers and Electrical Engineering}} 0045-7906 40 , year={2014} } @book{b13, , title={{UNSW-NB15: A Comprehensive DataSet for Network Intrusion Detection Systems Military Communications and Information Systems Conference}} , author={{ NMoustafa } and { Slay J }} , year={2015} } @incollection{b14, , title={{}} , author={{ TMitchell }} , journal={{Machine Learning. McGraw-Hill}} , year={1997} } @incollection{b15, , title={{Feature Selection using Attribute Ratio in NSL-KDD data}} , author={{ CSang-Hyun } and { CHee-Su }} , booktitle={{International Conference Data Mining, Civil and Mechanical Engineering (ICDMCME'2014)}} Bali (Indonesia , year={2014. Feb 4-5, 2014} } @incollection{b16, , title={{}} 10.1007/s13042-015-0469-8 , journal={{Int. J. Mach. Learn. & Cyber}} 8 , year={2017} } @book{b17, , title={{Determining appropriate approaches for using data in feature}} , author={{ GAldehim } and { WangW }} , year={2017} }