1. Alrawashdeh K, Purdy C (2016) Toward an online anomaly intrusion detection system based on deep learning, in 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 195–200
2. Alter S (1996) Information Systems: A Management Perspective, 2nd edn. The Benjamin/Cummings, Menlo Park, CA
3. Bhattacharjee PS, Fujail AKM, Begum SA (2017) Intrusion detection system for NSL-KDD data set using vectorised fitness function in genetic algorithm, Advanced Computer Sciences and Technologies, vol. 10, no. 2, pp. 235–246,
4. Boyce MW, Duma KM, Hettinger LJ, Malone TB, Wilson DP, Lockett-Reynolds J (2011) Human performance in cybersecurity: A research agenda, in Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 55, pp. 1115–1119
5. Brancheau JC, Wetherbe JC (1987) Key issues in information systems management MIS Quarterly, pp. 23–45,