1. Outside the closed world: On using machine learning for network intrusion detection;Sommer,2010
2. Machine learning in cyber-security-problems, challenges and data sets;Amit,2018
3. A toolset for intrusion and insider threat detection;Ring,2017
4. Identifying encrypted malware traffic with contextual flow data;Anderson,2016
5. The base-rate fallacy and the difficulty of intrusion detection;Axelsson;ACM Trans. Inf. Syst. Secur.,2000