1. Anderson, J P Computer Security Threat Monitoring and Surveillance, Technical report, James P. Anderson Co., Fort Washington, Pennsylvania (1980).
2. Christmas, P Network Security Manager, Elsevier Advanced Technology, UK (1992).
3. Davies, D W and Price, W L Security for Computer Networks: An Introduction to Network Security in Teleprocessing and Electronic Funds Transfer, John Wiley & Sons Ltd., UK (1992).
4. Denault, M, Gritzalis, D, Karagiannis, D and Spyrakis, P, ‘Intrusion-Detection: Evaluation and Performance Issues of the SECURENET System’, Computer and Security, Vol. 13, No 6, pp 495–508, October 1994.
5. Denning, D E Cryptography and Data Security, Addison — Wesley Publishing Company (1983).