1. Roy, D.B., Chaki, R.: State of the art analysis of network traffic anomaly detection. In: Applications and Innovations in Mobile Computing (AIMoC), IEEE, pp. 186–192 (2014)
2. Buczak, Anna L., Guven, Erhan: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutorials 18(2), 1153–1176 (2016)
3. Papernot, N., McDaniel, P., Goodfellow, I.: Transferability in Machine Learning: From Phenomena to Black-Box Attacks Using Adversarial Samples. arXiv preprint
arXiv:1605.07277
(2016)
4. Alkasassbeh, M.: An Empirical Evaluation for the Intrusion Detection Features Based on Machine Learning and Feature Selection Methods. arXiv preprint
arXiv:1712.09623
(2017)
5. Potluri, S., Diedrich, C.: High performance intrusion detection and prevention systems: a survey. In: ECCWS2016-Proceedings of the 15th European Conference on Cyber Warfare and Security. Academic Conferences and Publishing Limited (2016)