1. NIST-Guide to Intrusion Detection and Prevention Systems, February 2007.
http://csrc.nist.gov/publications/nistpubs/800-94/SP800-94.pdf
. Accessed 05 June 2010
2. Tsai, F.S., Chan, C.K. (eds.): Cyber Security. Pearson Education, Singapore (2006)
3. Nalavade, K., Meshram, B.B.: Mining association rules to evade network intrusion in network audit data. Int. J. Adv. Comput. Res. 4(2) issue 15 (2014). ISSN (print): 2249-7277 ISSN (online): 2277-7970
4. Tsai, F.S.: Network intrusion detection using association rules. Int. J. Recent Trends Eng. 2(2), 202 (2009)
5. Wikipedia.
https://en.wikipedia.org/w/index.php?title=Intrusion_detection_system&oldid=83971452”4