1. Alguliev R. Abdullaeva F., Illegal access detection in the cloud computing environment, Journal of Information Security, 2014, 5(02), 65.
2. Alsafi H. M., Abduallah W. M., Pathan A.-S. K., Idps: An integrated intrusion handling model for cloud, arXiv preprint arXiv:1203.3323, 2012.
3. Ambusaidi M. A., He X., Nanda P., Tan Z., Building an intrusion detection system using a filter-based feature selection algorithm, IEEE transactions on computers, 2016, 65(10), 2986–2998.
4. Aminanto E. Kim K., Deep learning in intrusion detection system: An overview, 2016 International Research Conference on Engineering and Technology (2016 IRCET), Higher Education Forum, 2016.
5. Aminanto M. E. Kim K., Deep learning-based feature selection for intrusion detection system in transport layer, Proceedings of the Korea Institutes of Information Security and Cryptology Conference, 2016, 740–743.