1. ENISA European Union Agency for Network and Information Security (ENISA), Threat Landscape Report 2018 15 Top Cyberthreats and Trends (2019). ISBN 978-929204-286-8, ISSN 2363-3050, https://doi.org/10.2824/622757, www.enisa.europa.eu
2. Scarfone, K., Mell, P.: Guide to Intrusion Detection and Prevention Systems (IDPS), National Institute of Standards and Technology, Special Publication 800–94 (2007). https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-94.pdf
3. Muniz, J., Lakhani, A.: Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer. Pearson Education Inc., Indianapolis (2018)
4. Abdelhameed, M.: Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic. A thesis for the degree of Doctor of Philosophy. University of New South Wales Australia. June 2017. https://www.researchgate.net/publication/328784548_Designing_an_online_and_reliable_statistical_anomaly_detection_framework_for_dealing_with_large_high-speed_network_traffic#fullTextFileContent. Accessed 05 July 2020
5. Al-Garadi, M., Mohamed, A., Al-Ali, A., Du, X., Guizani, M.: A survey of machine and deep learning methods for Internet of Things (IoT) security (2018). https://www.researchgate.net/publication/326696402_A_Survey_of_Machine_and_Deep_Learning_Methods_for_Internet_of_Things_IoT_Security. Accessed 05 July 2020