1. Ali, J., 2017. Mechanism for the prevention of password reuse through anonymized hashes. PeerJ PrePrints 5, e3322. URL: https://doi.org/10.7287/peerj.preprints.3322v1, doi:10.7287/peerj.preprints.3322v1.
2. Barbaro, M., Jr., T.Z.,. A face is exposed for aol searcher no. 4417749. URL: http://www.nytimes.com/2006/08/09/technology/09aol.html?mcubz=2. the New York Times. Online at: http://www.nytimes.com/2006/08/09/technology/09aol.html?mcubz=2.
3. Network anomaly detection: Methods, systems and tools;Bhuyan;IEEE Communications Surveys Tutorials,2014
4. Anomaly detection: A survey;Chandola;ACM Comput. Surv.,2009
5. A white-box anomaly-based framework for database leakage detection;Costante;J. Inf. Secur. Appl.,2017