1. Chogovadze, G., Gogichaishvili, G., Surguladze, G., & Sherozi, O. (2001). Design and construction of automated management systems. Tbilisi: GTU.
2. Gogichaishvili, G., Odisharia, K., & Shonia, O. (2008). Information protection in automated systems. Tbilisi: GTU.
3. Vacca, J. (2014). Network And System Security. Waltham: Steven Elliot.
4. Bhuyan, M., Bhattacharyya, D., & Kalita, J. (2014). Network anomaly detection: methods, systems and tools. IEEE communications surveys & tutorials, 303-336.
5. Baddar, S., Merlo, A., & Migliardi, M. (2014). Anomaly Detection in Computer Networks: A State-of-the-Art Review. Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 29–64.