1. Friday K, Bou-Harb E, Crichigno J, Scanlon M, Beebe N (2021) On offloading network forensic analytics to programmable data plane switches. World Scientific Publishing, Digital forensics and cybersecurity
2. Li J, Qu Y, Chao F, Shum HP, Ho ES, Yang L (2019) Machine learning algorithms for network intrusion detection. In: Sikos LF (ed) AI Cybersecurity. Springer International Publishing, Cham, pp 151–179
3. Liu H, Lang B (2019) Machine learning and deep learning methods for intrusion detection systems: a survey. Appl Sci 9(20):4396
4. Xin Y, Kong L, Liu Z, Chen Y, Li Y, Zhu H, Gao M, Hou H, Wang C (2018) Machine learning and deep learning methods for cybersecurity. IEEE Access 6:35365–35381
5. . Anderson JP (1980) “Computer Security Threat Monitoring and Surveillance”, In: Technical Report James P Anderson Co Fort Washington Pa, pp. 56