An evaluation of feature selection methods and their application to computer security (1992)

by J Doak