1. M. Loukides. “What is data science?”
http://radar.oreilly.com/2010/06/what-is-data-science.html
, 2010.
2. A. Lazarevic, V. Kumar, and J. Srivastava, “Intrusion detection: A survey,” Managing Cyber Threats, vol.5, Part I, pp. 19–78, June 2005.
3. S. Suthaharan, M. Alzahrani, S. Rajasegarar, C. Leckie and M. Palaniswami. “Labelled data collection for anomaly detection in wireless sensor networks,” in Proceedings of the 6th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, pp. 269–274, 2010.
4. S. Bandari and S. Suthaharan. “Intruder detection in public space using suspicious behavior phenomena and wireless sensor networks,” in Proceedings of the 1st ACM International Workshop on Sensor-Enhanced Safety and Security in Public Spaces at ACM MOBIHOC, pp. 3–8, 2012.
5. P. Zikopoulos, C. Eaton, et al. “Understanding big data: Analytics for enterprise class hadoop and streaming data.” McGraw-Hill Osborne Media, 2011.