1. Advanced Persistent Threat. Understanding the Danger and How to Protect Your Organization;Code,2012
2. Behavior-based anomaly detection on big data;Kim;Australian Information Security Management Conference,2015
3. Luh R, Schrittwieser S, Marschalek S, Janicke H. Design of an Anomaly-based Threat Detection & Explication System. International Conference on Information Systems Security and Privacy. 2017; 3: p. 397-402.
4. Mees W. Multi-agent anomaly-based APT detection. Information Assurance and Cyber Defence. 2012; MP-IST-111-03.
5. A practical approach on clustering malicious pdf documents;Vatamanu;Journal of Computer Virology and Hacking Techniques,2012