1. Assigning attack signatures to security policies (2022). https://techdocs.f5.com/kb/en-us/products/big-ip_asm/manuals/product/asm-bot-and-attack-signatures-13-0-0/1.html
2. Althubiti, S., Yuan, X., Esterline, A.: Analyzing http requests for web intrusion detection (2017)
3. Chen, Z., Liu, J., Gu, W., Su, Y., Lyu, M.R.: Experience report: deep learning-based system log analysis for anomaly detection. CoRR abs/2107.05908 (2021). https://arxiv.org/abs/2107.05908
4. Du, M., Li, F., Zheng, G., Srikumar, V.: DeepLog: anomaly detection and diagnosis from system logs through deep learning, pp. 1285–1298 (2017). https://doi.org/10.1145/3133956.3134015
5. Guo, H., Yuan, S., Wu, X.: LogBERT: log anomaly detection via BERT, pp. 1–8 (2021). https://doi.org/10.1109/IJCNN52387.2021.9534113