1. Fosnock, C.: Computer Worms: Past, Present and Future. East Carolina University. Kabiri, P., Ghorbani, A.A. Research on intrusion detection and response: A survey. International Journal of Network Security, 1(2), 84–102 (2005)
2. Moskovitch, R., Gus, I., Pluderman, S., Stopel, D., Fermat, Y., Shahar, Y., Elovici, Y.: Host Based Intrusion Detection Using Machine Learning. In: Proceedings of Intelligence and Security Informatics, May 2007, Rutgers University (2007)
3. Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines (2001), Software available at
http://www.csie.ntu.edu.tw/~cjlin/libsvm
4. Quinlan, J.R.: C4.5: programs for machine learning. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA (1993)
5. Mitchell, T.: Machine Learning. McGraw-Hill, New York (1997)