1. Wei, H., Chen, H., Guo, Y., Jing, G., & Tao, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications,60, 19–31.
2. Yang, Y., McLaughlin, K., Sezer, S., Littler, T., Im, E. G., Pranggono, B., et al. (2016). A concise model to evaluate the security of SCADA systems based on security standards. International Journal of Computer Applications,111(14), 1–9.
3. Sezer, S., Pranggono, B., & Wang, H. F. (2017). Host-based intrusion detection systems adapted from agent-based artificial immune systems. Neurocomputing Journal,88, 78–86.
4. Suthaharan, S., Alzahrani, M., Rajasegarar, S., Leckie, C., & Palaniswami, M. (2016). Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Transactions on Computers,99, 1–13.
5. Sanyal, S., Das, N., & Sarkar, T. A. (2016). Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems. International Journal of Critical Infrastructure Protection,6(2), 63–75.