1. Symantec internet security threat report, URL:http://www.symantec.com/, 2020. Accessed March 1, 2021.
2. Verizon’s data breach investigation report 2014, URL:http://www.verizonenterprise.com/DBIR/2014/, 2014. Accessed March 1, 2021.
3. Efficient decision tree for protocol analysis in intrusion detection;Abbes;International Journal of Security and Networks,2010
4. Fault diagnosis for wireless sensor network based on genetic-support vector machine;Zhi,2011
5. Intrusion detection system using deep neural network for in-vehicle network security;Kang;PloS one,2016