1. Mell, P.: Understanding intrusion detection systems. Auerbach Publications (2003)
2. Cyber Kill Chain®, https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html. Accessed 05 Aug 2022
3. Sridharan, A., Ye, T., Bhattacharyya, S.: Connectionless port scan detection on the backbone. In: 2006 IEEE International Performance Computing and Communications Conference, pp. 567–576. IEEE, Phoenix, AX, USA (2006)
4. Nisa, M.u., Kifayat, K.: Detection of slow port scanning attacks. In: 2020 International Conference on Cyber Warfare and Security (ICCWS), pp. 1–7. IEEE, Islamabad (2020)
5. Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Surveying port scans and their detection methodologies. Comput. J. 54(10), 1565–1581 (2011)