1. Qin, X., and Lee, W. (2004, January 6–10). Attack plan recognition and prediction using causal networks. Proceedings of the 20th Annual Computer Security Applications Conference, Tucson, AZ, USA.
2. Salem, M.B., Hershkop, S., and Stolfo, S.J. (2008). A Survey of Insider Attack Detection Research, Insider Attack and Cyber Security: Beyond the Hacker, Springer.
3. Kou, Y., Lu, C.T., Sirwongwattana, S., and Huang, Y.P. (2004, January 21–23). Survey of Fraud Detection Techniques. Proceedings of the IEEE International Conference on Networking, Sensing and Control, Teipei, Tiwan.
4. Analysis of network traffic features for anomaly detection;Iglesias;Mach. Learn.,2015
5. Principal component analysis: A review and recent developments;Jolliffe;Philos. Trans. R. Soc. A Math. Phys. Eng. Sci.,2016