1. Accenture Security (2017) Cost of cyber crime study.
https://www.accenture.com/us-en/insight-cost-of-cybercrime-2017
. Accessed 5 Jan 2018.
2. Aha, D, Kibler D (1991) Instance-based learning algorithms. Mach Learn 6:37–66.
3. Al-Jarrah OY, Yoo PD, Muhaidat S, Karagiannidis GK, Taha K (2015) Efficient machine learning for big data: A review. Big Data Res 2(3):87–93.
https://doi.org/10.1016/j.bdr.2015.04.001
.
4. Almukaynizi, M, Nunes E, Dharaiya K, Senguttuvan M, Shakarian J, Shakarian P (2017) Proactive identification of exploits in the wild through vulnerability mentions online In: Proceedings of the 2017 International Conference on Cyber Conflict (CyCon U.S.), 82–88.
5. Babko-Malaya, O, Cathey R, Hinton S, Maimon D, Gladkova T (2017) Detection of hacking behaviors and communication patterns on social media In: Proceedings of the 2017 IEEE International Conference on Big Data, 4636–4641.