1. Comer, D.E.: Computer Networks and Internets, 6th edn, p. 672. Upper Saddle River, Pearson (2014)
2. Kotenko, I.V., Saenko, I.B.: Creating new generation cybersecurity monitoring and management systems. Herald Russ. Acad. Sci. 84(6), 993–1001 (2014)
3. Branitskiy, A., Kotenko, I.: Hybridization of computational intelligence methods for attack detection in computer networks. J. Comput. Sci. Elsevier (2016). http://www.sciencedirect.com/science/journal/aip/18777503 . Accessed 1 Aug 2016
4. Branitskiy, A., Kotenko, I.: Network attack detection based on combination of neural, immune and neuro-fuzzy classifiers. In: 18th IEEE International Conference on Computational Science and Engineering (IEEE CSE2015), pp. 152–159. Porto, Portugal (2015)
5. Amini, M., Rezaeenour, J., Hadavandi, E.: Effective intrusion detection with a neural network ensemble using fuzzy clustering and stacking combination method. J. Comput. Secur. 1(4), 293–305 (2015)