1. Bahrololum, M., Khaleghi, M.: Anomaly intrusion detection system using Gaussian mixture model. In 3rd International Conference on Convergence and Hybrid Information Technology, pp. 1162–1167 (2008)
2. Asia-Pacific Security Appliance Market to Reach $2.6bn: IDC. Computer Business Review. http://www.cbronline.com/news/security/asia-pacific-security-appliance-market-to-reach-26bn-idc-231112 . Accessed 15 March 2017
3. Brox, A.: Signature-based and anomaly-based intrusion detection: the practice and pitfalls. SC Media. http://www.scmagazine.com/signature-based-or-anomaly-based-intrusion-detection-the-practice-and-pitfalls/article/30471/ . Accessed 15 Mar 2017
4. Stoianov, N., Uruena, M., Niemiec, M., Machnik, P., Maestro, G.: Security infrastructures: towards the INDECT system security. Multimedia Communi. Serv. Secur. 287, 304–315 (2012)
5. Tzur-David, S.: Network intrusion prevention systems: signature-based and anomaly detection. Ph.D. thesis, The Hebrew University of Jerusalem (2011)