1. Andra, U.: Network Security in the Age of Hyperconnectivity_ Pervasive, Proactive, and Persistent Protection is Essential to Thwart Cyberattacks.
https://blogs.cisco.com/sp/network-security-in-the-age-of-hyperconnectivity-pervasive-proactive-and-persistent-protection-is-essential-to-thwart-cyberattacks
2. Ashari, A., Paryudi, I., Min, A.: Performance comparison between Naïve Bayes, decision tree and k-nearest neighbor in searching alternative design in an energy simulation tool. Int. J. Adv. Comput. Sci. Appl. 4, 33–39 (2013)
3. Cervantes, C., Poplade, D., Nogueira, M., Santos, A.: Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for internet of things. In: Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management, IM 2015, pp. 606–611 (2015)
4. Dhanabal, L., Shantharajah, S.P.: A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int. J. Adv. Res. Comput. Commun. Eng. 4, 446–452 (2015)
5. Feng, Y., Akiyama, H., Lu, L., Sakurai, K.: Feature selection for machine learning-based early detection of distributed cyber attacks. In: The IEEE Cyber Science and Technology Congress (CyberSciTech), CyberSciTech 2018, pp. 173–180 (2018)