1. Alomari, E., Manickam, S., Gupta, B.B., Karuppayah, S., Alfaris, R.: Botnet-based distributed denial of service (ddos) attacks on web servers: classification and art. Int. J. Comput. Appl. 49(7), 24–32 (2012)
2. Ambusaidi, M.A., He, X., Nanda, P., Tan, Z.: Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans. Comput. 65(10), 2986–2998 (2016)
3. Atat, R., Liu, L., Chen, H., Wu, J., Li, H., Yi, Y.: Enabling cyber-physical communication in 5g cellular networks: challenges, spatial spectrum sensing, and cyber-security. IET Cyber-Phys. Syst. 2(1), 49–54 (2017)
4. Baig, Z.A., Sait, S.M., Shaheen, A.R.: Gmdh-based networks for intelligent intrusion detection. Eng. Appl. Artif. Intell. 26(7), 1731–1740 (2013)
5. Cai, J., Wang, Y., Liu, Y., Luo, J.Z., Wei, W., Xu, X.: Enhancing network capacity by weakening community structure in scale-free network. Future Gener. Comput. Syst. (2017).
https://doi.org/10.1016/j.future.2017.08.014