1. Stefan Axelsson, The base-rate fallacy and its implications for the difficulty of intrusion detection, Proceedings of the 6th ACM conference on Computer and communication security (Kent Ridge Digital Labs, Singapore), ACM Press, November 1999, pp. 1–7.
2. Tim Bass, Intrusion detection systems and multisensor data fusion, Communications of the ACM 43 (2000), no. 4, 99–105.
3. Curtis A. Carver, Adaptive agent-based intrusion response, Ph.D. thesis, Texas A&M University, 2001.
4. S. Cheung and U. Lindqvist; M.W Fong, Modeling multistep cyber attacks for scenario recognition, DARPA Information Survivability Conference and Exposition, vol. 1, IEEE, April 2003, pp. 284–292.
5. T. Chyssler, S. Nadjm-Tehrani, S. Burschka, and K. Burbeck, Alarm reduction and correlation in defence of ip networks, the 13th International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE04), June 2004.