J. C. Ang, A. Mirzal, H. Haron, and H. N. Hamed, Supervised, Unsupervised, and Semi-Supervised Feature Selection: A Review on Gene Selection, IEEE/ACM Transactions on Computational Biology and Bioinformatics, vol.13, issue.5, pp.971-989, 2016.
DOI : 10.1109/TCBB.2015.2478454

A. Bar, A. Finamore, P. Casas, L. Golab, and M. Mellia, Large-scale network traffic monitoring with DBStream, a system for rolling big data analysis, 2014 IEEE International Conference on Big Data (Big Data), pp.165-170, 2014.
DOI : 10.1109/BigData.2014.7004227

A. Buczak and E. Guven, A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection, IEEE Communications Surveys & Tutorials, vol.18, issue.2, pp.1-26, 2015.
DOI : 10.1109/COMST.2015.2494502

G. Chandrashekar and F. Sahin, A survey on feature selection methods, Computers & Electrical Engineering, vol.40, issue.1, pp.16-28, 2014.
DOI : 10.1016/j.compeleceng.2013.11.024

I. Guyon, J. Weston, S. Barnhill, and V. Vapnik, Gene selection for cancer classification using support vector machines, Machine learning, vol.46, pp.1-3389, 2002.

M. A. Hall, Correlation-based Feature Selection for Machine Learning, 1999.

J. Heidemann and C. Papdopoulos, Uses and challenges for network datasets. Em Conference For Homeland Security, 2009. CATCH'09, Cybersecurity Applications & Technology, pp.73-82, 2009.
DOI : 10.1109/catch.2009.29

P. Hu, H. Li, H. Fu, D. Cansever, and P. Mohapatra, Dynamic defense strategy against advanced persistent threat with insiders, 2015 IEEE Conference on Computer Communications (INFOCOM), pp.747-755, 2015.
DOI : 10.1109/INFOCOM.2015.7218444

W. Lee, S. J. Stolfo, and K. W. Mok, Mining in a data-flow environment, Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '99, pp.114-124, 1999.
DOI : 10.1145/312129.312212

R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall et al., Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, pp.12-26, 2000.
DOI : 10.1109/DISCEX.2000.821506

M. Mayhew, M. Atighetchi, A. Adler, and R. Greenstadt, Use of machine learning in big data analytics for insider threat detection, MILCOM 2015, 2015 IEEE Military Communications Conference, pp.915-922, 2015.
DOI : 10.1109/MILCOM.2015.7357562

D. Mladeni´cmladeni´c, C. Saunders, M. Grobelnik, S. Gunn, and J. Shawe-taylor, Feature Selection for Dimensionality Reduction, Subspace, Latent Structure and Feature Selection (SLSFS): Statistical and Optimization Perspectives Workshop., páginas, pp.84-102, 2006.

P. Lobato, A. G. , A. Lopez, M. Duarte, and O. C. , Um Sistema Acurado de DetecçDetecç?Detecção de Ameaças em Tempo Real por Processamento de Fluxos, Em SBRC, pp.572-585, 2016.

V. Paxson, Bro: a system for detecting network intruders in real-time, Computer Networks, vol.31, issue.23-24, pp.23-242435, 1999.
DOI : 10.1016/S1389-1286(99)00112-7

R. Sikonja, M. Kononenko, and I. , Theoretical and Empirical Analysis of ReliefF and RReliefF, Machine Learning, pp.23-69, 2003.

M. Roesch, Snort-Lightweight Intrusion Detection for Networks, Em Proceedings of the 13th USENIX conference on System administration, pp.229-238, 1999.

B. Schölkopf, A. J. Smola, and K. Müller, Kernel principal component analysis. Em Advances in kernel methods, pp.327-352, 1999.

R. Sommer and V. Paxson, Outside the Closed World: On Using Machine Learning for Network Intrusion Detection, 2010 IEEE Symposium on Security and Privacy, pp.305-316, 2010.
DOI : 10.1109/SP.2010.25

M. Stonebraker, U. Zdonik, and S. , The 8 requirements of real-time stream processing, ACM SIGMOD Record, vol.34, issue.4, pp.42-47, 2005.
DOI : 10.1145/1107499.1107504

M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani, A detailed analysis of the KDD CUP 99 data set, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009.
DOI : 10.1109/CISDA.2009.5356528

M. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson et al., The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. Em Recent Advances in Intrusion Detection, pp.107-126, 2007.
DOI : 10.1007/978-3-540-74320-0_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.76.4653

L. Van-der-maaten, E. Postma, and J. Den-herik, Dimensionality reduction: a comparative, Journal of Machine Learning Research, vol.10, pp.66-71, 2009.