1. A survey of network anomaly detection techniques;Ahmed;J. Netw. Comput. Appl.,2016
2. Taxonomy of supervised machine learning for intrusion detection systems;Ahmim,2020
3. The great threat intelligence debate;Anstee;Comput. Fraud Secur.,2017
4. PURE: Generating quality threat intelligence by clustering and correlating OSINT;Azevedo,2019
5. Standardizing cyber threat intelligence information with the structured threat information expression (STIX);Barnum;Mitre Corp.,2012