1. On the effectiveness of machine and deep learning for cyber security;Apruzzese,2018
2. B.Deply, 2014. Mimikatz. https://github.com/gentilkiwi/mimikatz.
3. Machine learning cyberattack and defense strategies;Bland;Computers & Security,2020
4. Boileau, A.,. Trust transience: Post intrusion ssh hijacking. In Blackhat Briefings August 2005.
5. A new hybrid approach for intrusion detection using machine learning methods;Çavusoglu;Appl. Intell.,2019