1. Al Tobi, A.M., Duncan, I.: KDD 1999 generation faults: a review and analysis. J. Cyber Secur. Technol., 1–37 (2018).
https://doi.org/10.1080/23742917.2018.1518061
,
https://www.tandfonline.com/doi/full/10.1080/23742917.2018.1518061
2. Bay, S.D., Hettich, S.: UCI KDD Cup 1999. University of California, Irvine, School of Information and Computer Sciences (1999).
https://archive.ics.uci.edu/ml/machine-learning-databases/kddcup99-mld/kddcup99.html
3. Hald, S.L.N., Pedersen, J.M.: An updated taxonomy for characterizing hackers according to their threat properties. In: 2012 14th International Conference on Advanced Communication Technology, pp. 81–86. IEEE (2012)
4. Hindy, H., et al.: A taxonomy and survey of intrusion detection system design techniques, network threats and datasets.
arXiv:1806.03517
[cs], June 2018
5. Lecture Notes in Computer Science;T Kokkonen,2015