1. Rebecca Gurley Bace . 2000. Intrusion detection . Sams Publishing . Rebecca Gurley Bace. 2000. Intrusion detection. Sams Publishing.
2. Anna L Buczak and Erhan Guven . 2015. A survey of data mining and machine learning methods for cyber security intrusion detection . IEEE Communications surveys & tutorials 18, 2 ( 2015 ), 1153–1176. Anna L Buczak and Erhan Guven. 2015. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications surveys & tutorials 18, 2 (2015), 1153–1176.
3. Marcos Cavalcanti , Pedro Inacio , and Mario Freire . 2021. Performance Evaluation of Container-Level Anomaly-Based Intrusion Detection Systems for Multi-Tenant Applications Using Machine Learning Algorithms . In The 16th International Conference on Availability, Reliability and Security. 1–9. Marcos Cavalcanti, Pedro Inacio, and Mario Freire. 2021. Performance Evaluation of Container-Level Anomaly-Based Intrusion Detection Systems for Multi-Tenant Applications Using Machine Learning Algorithms. In The 16th International Conference on Availability, Reliability and Security. 1–9.
4. A OneM2M Intrusion Detection and Prevention System based on Edge Machine Learning
5. Clarence Chio and David Freeman . 2018. Machine learning and security: Protecting systems with data and algorithms. " O’Reilly Media , Inc .". Clarence Chio and David Freeman. 2018. Machine learning and security: Protecting systems with data and algorithms. " O’Reilly Media, Inc.".