1. IBM Security and Ponemon Institute LLC, Cost of a Data Breach Report 2019. https://www.ibm.com/. Accessed Jan 2020
2. N. Ye, S. Vilbert, Q. Chen, Computer intrusion detection through EWMA for autocorrelated and uncorrelated data. IEEE Trans. Reliab. 52(1), 75–82 (2003)
3. J.R. Harrow, F.P. Messinger, System Monitoring Method and Device Including a Graphical User Interface to View and Manipulate System Information. US Patent 5,375,199, 20 Dec 1994
4. Swatchdog, Simple Log Watcher. https://sourceforge.net/projects/swatch/les/swatchdog/. Accessed Jan 2020
5. S.E. Hansen, E.T. Atkins, Automated system monitoring and notification with swatch, in Proceedings of the 7th USENIX Conference on System Administration, USENIX Association, Monterey, CA, USA, 1993, pp. 145–152