1. IETF IPFIX Working Group,
http://datatracker.ietf.org/wg/ipfix/charter
2. Verizon. 2014 Data Breach Investigations Report,
http://www.verizonenterprise.com/DBIR/2014/
3. Weka project homepage,
http://www.cs.waikato.ac.nz/ml/weka
4. AISC;P. Bereziński,2014
5. Brauckhoff, D.: Network traffic anomaly detection and evaluation. ETH, Zurich (2010)