1. Jajodia, S., Liu, P., Swarup, V., Wang, R., & Wang, X. S. (2011). Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats. Springer.
2. Zhou, J., Chen, Y., Deng, S., Wu, X., Wang, H., & Zhang, J. (2020). Intrusion detection based on machine learning techniques: A comprehensive survey. Computer Networks, 180, 107426.
3. Abbas, H., Khan, S. U., & Alghathbar, K. (2019). A survey of machine learning techniques for anomaly detection in cyber security. Computers & Security, 83, 169–187.
4. Naseri, M. S., Bigham, J., Salimi, S., & Dehghantanha, A. (2021). Machine learning techniques for network intrusion detection: A comprehensive survey. Journal of Network and Computer Applications, 178, 102954.
5. Lippmann, R. P., Fried, D. J., Graf, I., Haines, J. W., Kendall, K. R., McClung, D., & Wyschogrod, D. (2000). Evaluating Intrusion Detection Systems: The 1998 DARPA Off-Line Intrusion Detection Evaluation. Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX), 12(2), 12–26.