1. S. Axelsson, “Research in intrusion-detection systems: A survey,” 1998, Accessed: Nov. 01, 2021. [Online]. Available: https://neuro.bstu.by/ai/To-dom/My_research/Paper-0-again/For-research/D-mining/Anomaly-D/Intrusion-detection/survey.pdf.
2. “Bace, R., An introduction to intrusion detection… - Google Scholar.” https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Bace%2C+R.%2C+An+introduction+to+intrusion+detection+and+assessment+for+system+and+network+security+management.+ICSA+Intrusion+Detection+Systems+Consortium+Technical+Report%2C+1999.&btnG= (accessed Nov. 01, 2021).
3. D. D.-I. T. on software engineering and U. 1987, “An intrusion-detection model,” ieeexplore.ieee.org, vol. 13, no. 2, pp. 222–232, 1987, Accessed: Nov. 01, 2021. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/1702202/.
4. V. Kumar, O. S.-I. J. of Computer, and U. 2012, “Signature based intrusion detection system using SNORT,” academia.edu, Accessed: Nov. 01, 2021. [Online]. Available: https://www.academia.edu/download/32524356/171-654-1-PB.pdf.
5. A. Alazab, M. Hobbs, … J. A.-… on communications and, and undefined 2012, “Using feature selection for intrusion detection system,” ieeexplore.ieee.org, Accessed: Nov. 01, 2021. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/6380910/.