1. Anderson JP (1980) Computer security threat monitoring and surveillance. Technical report, James P. Anderson Company, Fort Washington
2. Chaurasia S, Jain A (2014) Ensemble neural network and K-NN classifiers for intrusion detection. Int J Comput Sci Inf Technol 5:2481–2485
3. Ding N, Liu Y, Fan Y, Jie D (2020) Network attack detection method based on convolutional neural network, chapter, vol 68. Springer, Berlin, pp 610–620
4. Erlank AO, Bridges CP (2017) A hybrid real-time agent platform for fault-tolerant, embedded applications. Auton Agents Multi-Agent Syst 32(2):252–274
5. Glavic M (2006) Agents and multi-agent systems: a short introduction for power engineers. Technical report, University of Liege, 4000 Liege, Belgium