1. Conference series on Recent Advances in Intrusion Detection (RAID), http://www.raid-symposium.org/.
2. Oracle audit vault. http://www.oracle.com/technology/products/audit-vault/index.html
3. Common Criteria for Information Technology Security Evaluation (Version 3.1). Technical report, http://www.commoncriteriaportal.org/public/expert/index.php?menu=2, 2006.
4. Cristina Abad, Jed Taylor, Cigdem Sengul, William Yurcik, Yuanyuan Zhou, and Kenneth E. Rowe. Log correlation for intrusion detection: A proof of concept. In 19th Annual Computer Security Applications Conference (ACSAC 2003), pages 255–265, 2003.
5. Ant Allen. Intrusion Detection Systems (IDS): Perspective. Technical report, Gartner Research Report DPRO-95367, Technical Overview, January 2002.