1. V. Ambalavanan, “Cyber threats detection and mitigation using machine learning,” in Handbook of Research on Machine and Deep Learning Applications for Cyber Security. Hershey, PA, USA: IGI Global, 2020, pp. 132-149.
2. T. Thomas, A. P. Vijayaraghavan, and S. Emmanuel, “Machine learning and cybersecurity,” in Machine Learning Approaches in Cyber Security Analytics. Singapore: Springer, 2020, pp. 37-47. [Online]. Available: https://link.springer.com/chapter/10.1007/978-981-15-1706-8_3
3. F. Farahmand, S. B. Navathe, P. H. Enslow, and G. P. Sharp, “Managing vulnerabilities of information systems to security incidents,” in Proc. 5th Int. Conf. Electron. Commerce (ICEC), 2003, pp. 348-354.
4. P. Szor, The Art of Computer Virus Research and Defense: ART COMP VIRUS RES DEFENSE_p1. London, U.K.: Pearson, 2005. I. Firdausi, C. Lim, A. Erwin, and A. S. Nugroho, “Analysis of machine learning techniques used in behavior-based malware detection,” in Proc.2nd Int. Conf. Adv.
5. A. L. Buczak and E. Guven, “A survey of data mining and machine learning methods for cyber security intrusion detection,” IEEE Commun. Surveys Tuts. vol. 18, no. 2, pp. 1153-1176, 2nd Quart., 2016.