[1]
C. Brunner, “Processing Intrusion Data with Machine Learning and MapReduce”, AARMS, vol. 16, no. 1, pp. 37–52, Apr. 2017.