1. K. Matherson, “Machine Learning Log File Analysis,” Research Proposal, (2015).
2. T.D.Subha, C.Arunachala Perumal, T.D.Subash, “Nonlinear Adaptive Smart Antenna resource Management for 5G through to Surveillance System,” vol. 43, part 6, pp. 3562–3571, (2021).
3. B. Bansal and K. Singh, “Rule Based Intrusion Detection System to Identify Attacking Behaviour and Severity of Attacks,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 5, issue 1, (2015).
4. W. Li, “Automatic Log Analysis using Machine Learning,” Department of Information Technology, Uppsala University, (2013).
5. J. M. Reddy, D. P. Narang, C. Hota and P. Kumar, “P2P Traffic Classification for Intrusion Detection Systems,” In Security & Privacy Symposium, (2013).