1. Abdou A, Barrera D, van Oorschot PC (2016) What Lies Beneath? Analyzing Automated SSH Bruteforce Attacks, vol 9551, Springer International Publishing, chap 6, pp 72–91. https://doi.org/10.1007/978-3-319-29938-9_6
2. Alata E (2007) Observation, characterization and modeling of attack processes on the internet. PhD thesis, INSA of Toulouse, URL https://tel.archives-ouvertes.fr/tel-00280126/file/THESE_ERIC_ALATA_TSF.pdf
3. Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, Halderman JA, Invernizzi L, Kallitsis M, Kumar D, Lever C, Ma Z, Mason J, Menscher D, Seaman C, Sullivan N, Thomas K, Zhou Y (2017) Understanding the mirai botnet. In: 26th USENIX Security Symposium (USENIX Security 17), USENIX Association, Vancouver, BC, pp 1093–1110, URL https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/antonakakis
4. Bezut R, Bernet-Rollande V (2010) Study of dictionary attacks on ssh. Tech. rep., Universite de Technologie Compiegne, Compiegne, France, URL https://files.xdec.net/TX_EN_Bezut_Bernet-Rollande_BruteForce_SSH.pdf
5. Choi H, Lee H, Kim H (2009) Fast detection and visualization of network attacks on parallel coordinates. Comput Security 28(5):276–288. https://doi.org/10.1016/j.cose.2008.12.003, URL http://www.sciencedirect.com/science/article/pii/S0167404808001363