1. Mcafee technical report on night dragon operation. Technical report (2015)
2. The CAIDA UCSD Anonymized Internet Traces 2018 (2018). Accessed 10 Feb 2020
3. Ayala, L.: Active medical device cyber-attacks. Cybersecurity for Hospitals and Healthcare Facilities, pp. 19–37. Apress, Berkeley, CA (2016). https://doi.org/10.1007/978-1-4842-2155-6_3
4. Clausen, H., Flood, R., Aspinall, D.: Traffic generation using containerization for machine learning. In: Proceedings of the Dynamic and Novel Advances in Machine Learning and Intelligent Cyber Security Workshop. ACM (2019)
5. Di Crescenzo, G., Ghosh, A., Kampasi, A., Talpade, R., Zhang, Y.: Detecting anomalies in active insider stepping stone attacks. JoWUA 2(1), 103–120 (2011)