1. C.W. Geib, R.P. Goldman, Plan recognition in intrusion detection systems, in Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX’01, vol. 1 (IEEE, 2001)
2. A. Sathesh, Enhanced soft computing approaches for intrusion detection schemes in social media networks. J. Soft Comput. Paradigm (JSCP) 1(02), 69–79 (2019)
3. S.P. Sharmila, Balaji Rao Katika, Classification Model for Phishing e-mails with a Data Mining Approach, presented in International Conference on Advances in Engineering Science and Management (ICAESM 2021), Wainganga College of Engineering and Management, Nagpur, 25–26 Mar 2021, published in IJERCSE, Vol. 8 Issue-4 (April 2021), p. 55.
4. S.P. Sharmila, Harsha .P. Moger, An operative application of distributed ledger technology for banking domain. International Journal of Computer Science and Mobile Computing. Vol. 10, Issue-7, p-68 (July 2021). https://doi.org/10.47760/ijcsmc.2021.v10i07.010
5. O. Sheyner et al., Automated generation and analysis of attack graphs, in Proceedings 2002 IEEE Symposium on Security and Privacy (IEEE, 2002)