[
Agrawal R., Srikant R., Fast Algorithms for Mining Association Rules in Large Databases, In Proceedings of the 20th International Conference on Very Large Data Bases, VLDB ’94, Morgan Kaufmann Publishers Inc, San Francisco, CA, USA, 487-499.
]Search in Google Scholar
[
Barrett M., Framework for Improving Critical Infrastructure Cybersecurity Version 1.1, NIST Cybersecurity Framework, 2018 (available online, https://doi.org/10.6028/NIST.CSWP.04162018, last accessed: October 2021).
]Search in Google Scholar
[
Dasgupta D., Akhtar Z., Sen S., Machine Learning in Cybersecurity: A Comprehensive Survey, The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, 19, 1, 57-106 (2020).10.1177/1548512920951275
]Search in Google Scholar
[
Dean J., Ghemawat S., MapReduce: Simplified Data Processing on Large Clusters, Commun. Association for Computing Machinery, New York, NY, USA, 51, 1, 107-113 (2008).10.1145/1327452.1327492
]Search in Google Scholar
[
Fielding R.T., Reschke J., Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content, RFC 7231, ISSN: 2070-1721, June 2014.10.17487/rfc7231
]Search in Google Scholar
[
Han J., Kamber M., Pei J., Data Mining: Concepts and Techniques, ITPro Collection, Morgan Kaufmann Series in Data Management Systems, Morgan Kaufmann Publishers, 3rd Edition, 2012.
]Search in Google Scholar
[
Hutchins E., Cloppert M., Amin R., Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains, Proceedings of the 6th International Conference on I-Warfare and Security, Washington, DC, USA, 17–18 March 2011, 113-125.
]Search in Google Scholar
[
Jin Z., Cui Y., Yan Z., Survey of Intrusion Detection Methods Based on Data Mining Algorithms, In Proceedings of the 2019 International Conference on Big Data Engineering (BDE 2019). Association for Computing Machinery, New York, NY, USA, 98-106.10.1145/3341620.3341632
]Search in Google Scholar
[
Johannes U., Who Is Hunting for Your IPTV Set-Top Box?, SANS ISC InfoSec Forums, 2021 (available online: https://isc.sans.edu/forums/diary/Who+Is+Hunting+For+Your+IPTV+SetTop+Box/27912/, last accessed: October 2021)
]Search in Google Scholar
[
Jost R., WordPress Plugin Secure Copy Content Protection and Content Locking 2.8.1 - SQL-Injection (Unauthenticated) - CVE 2021-24931, Exploit Database, 2021 (available online: https://www.exploit-db.com/exploits/50733, last accessed: December 2021).
]Search in Google Scholar
[
Kabanda G., Performance of Machine Learning and other Artificial Intelligence Paradigms in Cybersecurity, Oriental Journal of Computer Science and Technology, 13, 1, 1–21 (2020).10.13005/ojcst13.01.01
]Search in Google Scholar
[
La Rocca M., Advanced Algorithms and Data Structures, Manning Publications, 173-217, 2021.
]Search in Google Scholar
[
Lee W., Stolfo S.J., Data-Mining Approaches for Intrusion Detection. In 7th USENIX Security Symposium, SSYM’98, USENIX Association, Berkeley, CA, USA, 1998, volume 7, 6–21.
]Search in Google Scholar
[
Lee W., Stolfo S.J., Mok K.W, Algorithms for Mining System Audit Data, In data-mining, Rough Sets and Granular Computing; Physica-Verlag GmbH: Heidelberg, Germany, 2002, 166-189 (2002).10.1007/978-3-7908-1791-1_8
]Search in Google Scholar
[
Lee W., Applying Data-Mining to Intrusion Detection: The Quest for Automation, Efficiency, and Credibility, SIGKDD Explor. 2002, 4, 35–42.10.1145/772862.772868
]Search in Google Scholar
[
Li N., Zeng L., He Q., Shi Z., Parallel Implementation of Apriori Algorithm Based on MapReduce, 2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 08-10 August 2012, Kyoto, Japan, 236–241.10.1109/SNPD.2012.31
]Search in Google Scholar
[
Mao W., Guo W., An Improved Association Rules Mining Algorithm Based on Power Set and Hadoop, 2013 International Conference on Information Science and Cloud Computing Companion, 07-08 December 2013, Guangzhou, China, 236-241.10.1109/ISCC-C.2013.39
]Search in Google Scholar
[
Mironeanu C., Archip A., Amarandei C.M., Craus M., Experimental Cyber Attack Detection Framework, Electronics, 10, 14:1682 (2021).10.3390/electronics10141682
]Search in Google Scholar
[
Mironeanu C., Prevenirea atacurilor cibernetice cu tehnici de data mining, Teza de doctorat, Universitatea Tehnică “Gheorghe Asachi” din Iaşi, 2021.
]Search in Google Scholar
[
Pols P., The Unified Kill Chain - Designing a Unified Kill Chain for Analyzing, Comparing and Defending Against Cyber Attacks, MSc. Degree Thesis, Delft University of Technology, 2017.
]Search in Google Scholar
[
Schneier B., The Process of Security, 2000 (available online: https://www.schneier.com/essays/archives/2000/04/the_process_of_secur.html, last accessed: October 2021).
]Search in Google Scholar
[
Sfakianakis A., Douligeris C., Marinos L., Lourenço M., Raghimi O., ENISA Threat Landscape Report 2018, Report O.1.2.1, European Union Agency for Network and Information Security, Heraklion, Greece, 47-53.
]Search in Google Scholar
[
Shustin R., We Decide What You See: Remote Code Execution on a Major IPTV Platform, Check Point Research, 2019 (available online: https://research.checkpoint.com/2019/we-decide-what-you-see-remote-code-execution-on-a-major-iptv-platform/, last accessed: October 2021).
]Search in Google Scholar
[
Widup S., Pinto A., Hylender C.D., Basset. G., Langlois P., Verizon Data Breach Investigations Report, Verizon USA, 2021 (available online: https://www.verizon.com/business/resources/reports/dbir/, last accessed: October 2021).10.1016/S1361-3723(21)00061-0
]Search in Google Scholar
[
*** Apache Hadoop, https://hadoop.apache.org/, last visit on October 2021.
]Search in Google Scholar