1. What lies beneath? Analyzing automated SSH bruteforce attacks;Abdou,2015
2. Outlier Analysis, Springer;Aggarwal,2013
3. Swatch: Simple log watcher;Atkinds,2015
4. Logging and log analysis;Basin,2011
5. Gephi: an open source software for exploring and manipulating networks;Bastian,2009