1. Information security breaches survey. Available from http://www.pwc.co.uk/assets/pdf/cyber-security-2013-technical-report.pdf (2013)
2. Snort Users Manual 2.9.3. Available from https://www.snort.org/documents (2014)
3. Emerging Threats.net Open rulesets. Available from http://rules.emergingthreats.net (2015)
4. Al-Shaer, E.S., Hamed, H.H.: Modeling and management of firewall policies. IEEE Trans. Netw. Serv. Manage. 1(1), 2–10 (2004)
5. Blanc, M., Briffaut, J., Clemente, P., El Rab, M.G., Toinard, C.: A collaborative approach for access control, intrusion detection and security testing, pp. 270–277 (2006)