1. K. Ethala, R. Sheshadri, Combatting cyber terrorism-assessment of log for malicious signatures. Am. J. Appl. Sci. 1660–1666 (2013)
2. R. Di Pietro, L.V. Mancini, Intrusion Detection Systems. Series: Advances in Information Security 38 (2008)
3. I.A.B. Bazara, H. Anthony Chan, in Handbook of Information and Communication Security. Intrusion detection systems (Springer, Berlin 2010)
4. W. Kanuom, N. Cuppens-Boulahia, F. Cuppens, F. Autrel, Advanced reaction using risk assessment in Intrusion detection system. Crit. Inf. Infrastruct. Secur LNCS 5141, 58–70 (2008)
5. A.A. Ghorbani, W. Lu, M. Tavallaee, Network intrusion detection and prevention. Series: Advances in Information Security (eBook, 2010)