1. Report of the international telecommunications union (ITU). (2016).
http://www.itu.int/en/ITU-D/Statistics/Pages/facts/default.aspx
. Accessed 13 April 2017.
2. Anderson, J. P. (1980). Computer security threat monitoring and surveillance. Technical report.
3. Denning, D. E. (1987). An intrusion-detection model. IEEE Transactions on Software - Engineering, 13(2), 222–232.
4. Curry, D., & Debar, H. (2006). Intrusion detection message exchange format data model and extensible markup language (xml) document type definition.
https://tools.ietf.org/html/draft-ietf-idwg-idmef-xml-16
. Accessed 13 April 2017.
5. Intrusion detection message exchange format (IDMEF).
www.ietf.org/rfc/rfc4765.txt
. Accessed 13 April 2017.