1. Javaid, A., Niyaz, Q., Sun, W., Alam, M.: A deep learning approach for network intrusion detection system. EAI Endorsed Trans. Secur. Saf. 3(9), e2 (2016)
2. Whitman, M.E., Mattord, H.J.: Principles of Information Security. Cengage Learning, Boston (2011)
3. Ashoor, A.S., Gore, S.: Importance of intrusion detection system (ids). Int. J. Sci. Eng. Res. 2(1), 1–4 (2011)
4. Garcia-Teodoro, P., Diaz-Verdejo, J., Maciá-Fernández, G., Vázquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1–2), 18–28 (2009)
5. van der Eijk, V., Schuijt, C.: Detecting cobalt strike beacons in netflow data