1. Alain G, Bengio Y (2016) Understanding intermediate layers using linear classifier probes. arXiv preprint arXiv:1610.01644
2. Andrej K (2016) Convolutional neural networks. Figshare. https://cs231n.github.io/convolutional-networks/. Accessed 30 Aug 2022
3. Axelsson S ((1998)) Research in intrusion-detection systems: A survey. Tech. rep., Technical report 98–17. Department of Computer Engineering, Chalmers
4. Berman DS, Buczak AL, Chavis JS, Corbett CL (2019) A survey of deep learning methods for cyber security. Information 10(4):122
5. Brand A, Allen L, Altman M, Hlava M, Scott J (2015) Beyond authorship: attribution, contribution, collaboration, and credit. Learn Publ 28(2):151–155