Anomaly-based network intrusion detection: Techniques, systems and challenges
Distribution of the number of citations over years.