1. Distributed intrusion detection system using blockchain and cloud computing infrastructure;Kumar,2020
2. J. P. Anderson, “Computer security threat monitoring and surveillance,” Technical Report, James P. Anderson Company, 1980.
3. Statistical analysis driven optimized deep learning system for intrusion detection;Ieracitano,2018
4. Network intrusion detection combined hybrid sampling with deep hierarchical network;Jiang;IEEE Access,2020
5. Using a long short-term memory recurrent neural network (lstm-rnn) to classify network attacks;Muhuri;Information,2020