1. S. Axelsson, Intrusion Detection Systems: A Survey and Taxonomy, Technical Report 99-15, Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden, 2000.
2. P. Bradford, M. Brown, J. Perdue and B. Self, Towards proactive computer-system forensics, Proceedings of the International Conference on Information Technology: Coding and Computing, vol. 2, pp. 648–652, 2004.
3. P. Bradford and N. Hu, A layered approach to insider threat detection and proactive forensics, Proceedings of the Twenty-First Annual Computer Security Applications Conference (Technology Blitz), 2005.
4. J. Cooperstein, Windows management instrumentation: Administering Windows and applications across your enterprise, MSDN Magazine (
http://msdn.microsoft.com/msdnmag/issues/0500/wmiover
), May 2000.
5. D. Denning, An intrusion-detection model, IEEE Transactions on Software Engineering, vol. 13(2), pp. 222–232, 1987.