1. Cisco (2023). What Is a Cyberattack?—Most Common Types, Cisco. Available online: https://www.cisco.com/c/en/us/products/security/common-cyberattacks.html#~how-cyber-attacks-work.
2. What Is a Cyberattack?, IBM. Available online: https://www.ibm.com/topics/cyber-attack.
3. Delplace, A., Hermoso, S., and Anandita, K. (2020). Cyber Attack Detection thanks to Machine Learning Algorithms. arXiv, Available online: https://arxiv.org/abs/2001.06309.
4. Alencar, R. (2017). Resampling Strategies for Imbalanced Datasets, Kaggle. Available online: https://www.kaggle.com/code/rafjaa/resampling-strategies-for-imbalanced-datasets.
5. Network intrusion detection using oversampling technique and machine learning algorithms;Ahmed;PeerJ. Comput. Sci.,2022