1. Banks, D., Prudence, M.: A High-performance Network Architecture for a PA-RISC Workstation. IEEE Journal on Selected Areas in Communications 11(2), 191–202 (1993)
2. Cheung, S., Crawford, R., Dilger, M., Frank, J., Hoagland, J., Levitt, K., Staniford-Chen, S., Yip, R., Zerkle, D.: The Design of GrIDS: A Graph-Based Intrusion Detection System, tech. report CSE-99-02, Computer Science Dept., Univ. of California Davis, Calif (1999)
3. Clark, D., Jacobson, V., Romkey, J., Salwen, M.: An Analysis of TCP Processing Overhead. IEEE Communications Magazine 27, 23–29 (1989)
4. Coit, J., Staniford, S., McAlerney, J.: Towards Faster String Matching for Intrusion Detection or Exceeding the Speed of Snort. In: Proc. DARPA Information Survivability Conference and Exposition (DISCEX II 2002), pp. 367–373. IEEE CS Press, Los Alamitos (2002)
5. Danyliw, R.: ACID: Analysis Console for Intrusion Databases (2001), http://acidlab.sourceforge.net