1. Gartner, “Gartner Identifies Top 10 Strategic IoT Technologies and Trends,” 2010. [Online]. Available: https://www.gartner.com/en/newsroom/press-releases/2018-11-07-gartner-identifies-top-10-strategic-iot-technologies-and-trends. [Accessed: 14-Dec-2019].
2. S. Al-Saqqa, M. Al-Fayoumi, and M. Qasaimeh, “Intrusion Detection System for Malicious Traffic Using Evolutionary Search Algorithm,” Recent Advances in Computer Science and Communications (Formerly: Recent Patents on Computer Science), vol. 14, no. 5, pp. 1381–1389, 2021.
3. S. S. Rajan and V. K. Cherukuri, “An overview of intrusion detection systems,” Retrieved May, vol. 12, no. 3, pp. 559–563, 2010.
4. Intrusion detection system: a comprehensive review;Liao;J Network Comput Appl,2013
5. Analysis and evaluation of network intrusion detection methods to uncover data theft;Corsini,2009