1. S. Abt and H. Baier, Are we missing labels? A study of the availability of ground truth in network security research, Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp. 40–55, 2014.
2. D. Brauckhoff, A. Wagner and M. May, FLAME: A flow-level anomaly modeling engine, Proceedings of the Conference on Cyber Security Experimentation and Test, article no. 1, 2008.
3. G. Brogi and V. Tong, Sharing and replaying attack scenarios with Moirai, presented at the Rendezvous de la Recherche et de l’Enseignement de la Sécurité des Systèmes d’Information (Information Systems Security Research and Education Meeting), 2017.
4. Carrier, B.: Open Source Digital Forensic Tools: The Legal Argument, @stake. Massachusetts, Cambridge (2002).
5. R. Chinchilla, J. Hoag, D. Koonce, H. Kruse, S. Osterman and Y. Wang, Characterization of Internet traffic and user classification: Foundations for the next generation of network emulation, Proceedings of the Tenth International Conference on Telecommunications Systems, Modeling and Analysis, 2002.