1. Palmer, G.: A road map for digital forensic research. First Digital Forensic Research Workshop, Utica, New York (2001)
2. McKemmish, Rodney: What is forensic computing?. Australian Institute of Criminology, Canberra (1999)
3. Khan, Minhaj Ahmad: A survey of security issues for cloud computing. J. Netw. Comput. Appl. 71, 11–29 (2016)
4. Oscar Serrano, C.I.S.A.: CISSP CISM, and Luc Dandurand. Big Data Analytics for Sophisticated Attack Detection (2014)
5. Jabez, J., Muthukumar, B.: Intrusion detection system (IDS): anomaly detection using outlier detection approach. Procedia Comput. Sci. 48, 338–346 (2015)