1. Scarfone, K., Mell, P.: NIST Special Publication 800-94, Guide to Intrusion Detection and Prevention Systems (IDPS), Recommendations of the National Institute of Standards and Technology, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, MD, United States, 20899–8930 (2007)
2. Anderson, R.: Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons, New York (2001)
3. Kunang, Y.N., Nurmaini, S., Stiawan, D., Suprapto, B.Y.: Attack classification of an intrusion detection system using deep learning and hyperparameter optimization. J. Inf. Secur. Appl. 58, 102804 (2021)
4. Sebring, M.M., Shellhouse, E., Hanna, M.E., Whitehurst, R.A.: Expert Systems in Intrusion Detection: A Case Study, Proceeding of the 11th National Computer Security Conference, pp. 74–81. Baltimore, MD (1988)
5. Lunt, T.F.: IDES: An intelligent system for detecting intruders,. In: Proceedings of the Symposium on Computer Security; Threats, and Countermeasures; Rome, November 22–23, 1990, 110–121 (1990)