1. Kavanagh MK, Rochford O. Magic quadrant for security information and event management, Technical ReportGartner2015.
2. Counter-Terrorism strategies in a fragmented international legal order;Van den Herik,2013
3. Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses;Ogun,2015
4. OSSIM Project 2015. https://www.alienvault.com/products/ossim.
5. Bot detection evasion: a case study on local-host alert correlation bot detection methods;Shirley;Secur Commun Netw,2012