1. Bhattacharyya DK, Kalita JK (2013) Network anomaly detection: a machine learning perspective, Kindle edn. CRC Press, Boca Raton, FL
2. Carnegie Mellon University & John Hopkins University (2019) Cybersecurity maturity model (CMMC). Retrieved from https://www.acq.osd.mil/cmmc/draft.html
3. Chio C, Freeman D (2018) Machine learning & security: protecting systems with data and algorithms. O’Reilly, Sebastopol, CA
4. Craigen D (2014) Assessing scientific contributions: a proposed framework and its application to cybersecurity. Technol Inform Manag Rev 4:5–13
5. Craigen D, Diakun-Thibault N, Purse R (2014) Defining cybersecurity. Technol Innov Manag Rev 4:13–21