1. Network entity characterization and attack prediction
2. J. Brownlee. 2019. How to Perform Feature Selection with Machine Learning Data in Weka. Retrieved from https://machinelearningmastery.com/perform-feature-selection-machine-learning-data-weka/. J. Brownlee. 2019. How to Perform Feature Selection with Machine Learning Data in Weka. Retrieved from https://machinelearningmastery.com/perform-feature-selection-machine-learning-data-weka/.
3. D. Burt P. Nicholas K. Sullivan and T. Scoles. 2014. The Cybersecurity Risk Paradox. Microsoft Security Intelligence Report Special Edition. Retrieved from https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/REVroz. D. Burt P. Nicholas K. Sullivan and T. Scoles. 2014. The Cybersecurity Risk Paradox. Microsoft Security Intelligence Report Special Edition. Retrieved from https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/REVroz.
4. Cisco. (n.d.). Cisco Talos. Retrieved from https://www.cisco.com/c/en/us/products/security/talos.html. Cisco. (n.d.). Cisco Talos. Retrieved from https://www.cisco.com/c/en/us/products/security/talos.html.