1. Evaluation of machine learning algorithms for intrusion detection system
2. A Self-Healing Mechanism for Internet of Things Devices
3. Monowar H Bhuyan , Dhruba Kumar Bhattacharyya , and Jugal K Kalita . 2013. Network anomaly detection: methods, systems and tools. Ieee communications surveys & tutorials 16, 1 ( 2013 ), 303–336. Monowar H Bhuyan, Dhruba Kumar Bhattacharyya, and Jugal K Kalita. 2013. Network anomaly detection: methods, systems and tools. Ieee communications surveys & tutorials 16, 1 (2013), 303–336.
4. Computer security incident handling guide;Cichonski Paul;NIST Special Publication,2012
5. Ozgur Depren , Murat Topallar , Emin Anarim , and M Kemal Ciliz . 2005. An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert systems with Applications 29, 4 ( 2005 ), 713–722. Ozgur Depren, Murat Topallar, Emin Anarim, and M Kemal Ciliz. 2005. An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert systems with Applications 29, 4 (2005), 713–722.