1. A. Wick, E.M. (2013). Moloch: Full packet capture. Accessed: 2020–01-20.
2. Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks;Abomhara;J. Cyber Secur. Mobility,2015
3. DL-FHMC: Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification;Abusnaina,2021
4. Abadi, M., P. Barham, J. Chen, Z. Chen, A. Davis, J. Dean, M. Devin, and S.G. et. al. (2016, Nov). TensorFlow: A System for Large-Scale Machine Learning. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16), Savannah, GA , pp. 265 – 283. USENIX Association.
5. Al-Rfou, R. (2016). Theano: A python framework for fast computation of mathematical expressions. ArXiv abs/1605.02688