References
- "SP-800-39 : Managing Information Security Risk: Organization, Mission, and Information System View," NIST, March 2011.
- "SP-800-94 : Guide to Intrusion Detection and Prevention Systems (IDPS)," NIST, February 2007
- Steven L. Scott, "A Bayesian paradigm for designing intrusion detection systems", Computational Statistics & Data Analysis 45, pp. 69-83, 2004 https://doi.org/10.1016/S0167-9473(03)00177-4
- "SP-800-92 : Guide to Computer Security Log Management," NIST, September 2006.
- S Bhatt, PK Manadhata, L Zomlot, "The operational role of security information and event management systems", IEEE Security & Privacy, 2014
- Shan Suthaharan, "Big data classification: problems and challenges in network intrusion prediction with machine learning", ACM SIGMETRICS Performance Evaluation Review, Volume 41 Issue 4, pp. 70-73, March 2014 https://doi.org/10.1145/2627534.2627557
- Tom M. Mitchell, "Machine Learning", McGraw Hill series in computer science, 1997
- Jurgen Schmidhuber, "Deep learning in neural networks: An overview", Neural networks, 2015
- Abdelhadi Azzouni, Guy Pujolle, "A Long Short-Term Memory Recurrent Neural Network Framework for Network Traffic Matrix Prediction", LIP6 / UPMC; Paris, France, arXiv preprint arXiv:1705.05690, 2017