1. [1] Lazarevic, A., Banerjee, A., Chandola, V., Kumar, V. and Srivastava, J.: Data Mining for Anomaly Detection, Tutorial at the European Conference on Principles and Practice of Knowledge Discovery in Databases (2008).
2. [2] SUCRI Blog: Mass WordPress Brute Force Attacks - Myth or Reality (2013), available from <http://blog.sucuri.net/2013/04/mass-wordpress-brute-force-attacks-myth-or-reality.html>.
3. [3] SUCRI Blog: The WordPress Brute Force Attack Timeline (2013), available from <http://blog.sucuri.net/2013/04/the-wordpress-brute-force-attack-timeline.html>.
4. [4] PCWorld: GitHub bans weak passwords after brute-force attack results in compromised accounts (2013), available from <http://www.pcworld.com/article/2065340/github-bans-weak-passwords-after-bruteforce-attack-results-in-compromised-accounts.html>.
5. [5] Honda, S., Unno, Y., Maruhashi, K., Takenaka, M. and Torii, S.: Detection of Novel-Type Brute Force Attacks used Ephemeral Springboard IPs as Camouflage, International Conference on Information and Network Security(ICINS2014) (2014).