1. ENISA, Threat Landscape 2014, 2015. Available: https://www.enisa.europa.eu/.
2. Symantec, Internet Security Threat Report 2014 Vol. 19, 2015. Available: https://www.symantec.com.
3. Sophos, Security Threat Report 2014, 2015. Available: http://www.sophos.com.
4. Network anomaly detection: Methods, systems and tools;Bhuyan;IEEE Commun. Surv. Tutor.,2014
5. Intrusion detection system: A comprehensive review;Hung-Jen;J. Netw. Comput. Appl.,2013