1. Security Log Management: Identifying Patterns in the Chaos;Babbin,2006
2. Bootstrapping a data mining intrusion detection system;Barbará,2003
3. Using Kohonen’s self-organizing feature map to uncover automobile bodily injury claims fraud;Brockett;J. Risk Insurance,1998
4. Outlier detection using isolation forest and local outlier factor;Cheng,2019
5. A Course in Computational Algebraic Number Theory;Cohen,2013