Bankovic Z., Stepanovich D., Bojanic S., Nieto-Taladris O.: Improving network security using genetic algorithm approach, Computers and Electrical Engineering, 33(5-6)/2007, 438–451.
Barsegyan A. A., Kupriyanov M. S., Stepanenko V. V., Kholod I. I.: Technologies of data analysis: Data Mining, Visual Mining, Text Mining, OLAP, SPb. BHV, Petersburg 2007.
Bhattacharyya D. K., Kalita J. K.: Network Anomaly Detection. A Machine Learning Perspective, CRC Press, 2014.
Brailovskyi M. M., Pogrebna T. V., Ptakhok O. V.: Essential requirements for the construction and safety of next-generation networks. Telecommunication and Information Technologies 2/2014, 41–49.
Brailovskyi N. N., Ivanchenko E. V., Khoroshko V. A.: Diagnostics of information space protection systems" Information protection. Special issue 2014, 59–67.
Ghahramani Z.: An Introduction to hidden Markov models and Bayesian networks. International Journal of Pattern Recognition and Artificial Intelligence 15/2001, 9–42.
Koboseva A. A., Machalin I. O., Khoroshko V. O.: Analysis of the security of information systems. DUIKT, Kiev 2010.
Pavlov I. M., Toliupa S. V., Nishchenko V. I.: Analysis of Taxonomy of Attack Detection Systems in the Context of the Current Level of Information Systems Development. Modern Protection of Information 4/2014, 44–52.
Tajbakhsh A., Rahmati M., Mirzaei A.: Intrusion detection using fuzzy association rules. Applied Soft Computing 9(2)/2009, 462–469.
Tereikovskiy I., Toliupa S., Parkhomenko I., Tereikovska L.: Markov Model of Normal Conduct Template of Computer Systems Network Objects. 14th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering TCSET-2018.
Toliupa S. V, Borisov I. V.: Methodology of evaluation of the complex system of information security at the object of information activity. Scientific and Technical Journal "Modern Information Protection" 2/2013, 43–49.
Toliupa S. V, Parkhomenko І. І., Konovalenko А. D.: Analysis of vulnerabilities of local wireless networks and ways to protect them from possible attacks. Journal of the Engineering Academy of Ukraine 3/2017, 72–76.
Toliupa S. V., Parkhomenko І. І.: Multilevel hierarchical models of information security systems. Proceedings of the II International scientific and practical conference Trends in the development of corvergent networks: decision of the post: NGN, 4G, 5G. Kyiv 2016, 111–114.
Valdes A., Skinner K.: Adaptive model-based monitoring for cyber attack detection. Proc. of the Recent Advances in Intrusion Detection, Toulouse, France, 2000, 80–92.
Valdes A., Skinner K.: Adaptive model-based monitoring for cyber attack detection. Proc. of the Recent Advances in Intrusion Detection. Toulouse 2000, 80–92.
Yang H., Xie F., Lu Y.: Clustering and classification based anomaly detection. Fuzzy Systems and Knowledge Discovery 4223/2006, 1082–1091.