1. J. Shen, S. Gong, W. Bao, Analysis of network security in daily life. Informat. Comput. Security (Transferred) 1(1) (2018)
2. M. Li et al., The study of APT attack stage model, in 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS) (IEEE, Piscataway, 2016), pp. 1–5
3. M. Marchetti et al., Analysis of high volumes of network traffic for advanced persistent threat detection. Comput. Netw. 109, 127–141 (2016)
4. Z. Hussain et al., Artificial intelligence-enabled social media analysis for pharmacovigilance of COVID-19 vaccinations in the United Kingdom: observational study. JMIR Public Health Surveillance 8(5), e32543 (2022)
5. I. Ghafir et al., A survey on network security monitoring systems, in 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW) (IEEE, Piscataway, 2016), pp. 77–82