1. Brilingaitė, A., Bukauskas, L., Kutka, E.: Time-line alignment of cyber incidents in heterogeneous environments. In: ECCWS 2018 17th European Conference on Cyber Warfare and Security, p. 57. Academic Conferences and Publishing Ltd. (2018)
2. Bushart, J., Rossow, C.: Padding ain’t enough: assessing the privacy guarantees of encrypted DNS. In: 10th USENIX Workshop on Free and Open Communications on the Internet ($$\{$$FOCI$$\}$$ 20) (2020)
3. Collins, M., Collins, M.S.: Network Security Through Data Analysis: Building Situational Awareness. O’Reilly Media, Inc., Newton (2014)
4. Lecture Notes in Computer Science;H Dreger,2005
5. Haas, S., Sommer, R., Fischer, M.: Zeek-osquery: Host-network correlation for advanced monitoring and intrusion detection. arXiv preprint arXiv:2002.04547 (2020)