1. Smith, Z. M., Lostri, E., Lewis, J. A. (2020). The Hidden Costs of Cybercrime. McAfee. Available at: https://www.mcafee.com/enterprise/en-us/assets/reports/rp-hidden-costs-of-cybercrime.pdf
2. Kolodchak, O. (2012). Suchasni metody vyiavlennia anomalii v systemakh vyiavlennia vtorhnen. [Modern methods of detecting anomalies in intrusion detection systems]. Visnyk Natsionalnoho un-tu «Lvivska politekhnika». Komp’iuterni systemy ta merezhi, 745, 98–104. Available at: https://science.lpnu.ua/sites/default/files/journal-paper/2017/nov/6726/16-98-104.pdf
3. Kazmirchuk, S. V., Korchenko, A. O., Parashchuk, T. I. (2018). Analiz system vyiavlennia vtorhnen [Analysis of intrusion detection systems]. Ukrainian Information Security Research Journal, 20(4). Available at: https://doi.org/10.18372/2410-7840.20.13425
4. Ruban, I. V., Martovytskyi, V. O., Partyka, S. O. (2016). Klasyfikatsiia metodiv vyiavlennia anomalii v informatsiinykh systemakh [Classification of methods for detecting anomalies in information systems]. Systemy ozbroiennia i viiskova tekhnika, (3), 100-105. Available at: http://nbuv.gov.ua/UJRN/soivt_2016_3_24
5. Radivilova, T., Kirichenko, L., Tawalbeh, M., Ilkov, A. (2021). Vyiavlennia anomalii v telekomunikatsiinomu trafiku statystychnymy metodamy [Detection of anomalies in the telecommunications traffic by statistical methods]. Cybersecurity: Education, Science, Technique, 11(3), 183–194. Available at: https://doi.org/10.28925/2663-4023.2021.11.183194