1. Honeypot project.
http://old.honeynet.org/
. Accessed 22 Mar 2018
2. Public security log sharing site (2006).
http://log-sharing.dreamhosters.com/
. Accessed 22 Mar 2018
3. Almorsy, M., Grundy, J.C., Müller, I.: An analysis of the cloud computing security problem. CoRR abs/1609.01107 (2016).
http://arxiv.org/abs/1609.01107
4. Breiman, L.: Bagging predictors. Mach. Learn. 24(2), 123–140 (1996).
https://doi.org/10.1023/A:1018054314350
5. Christian Matthies, M.H.: Phpids (2014).
https://github.com/PHPIDS/PHPIDS
. Accessed 11 May 2017