1. Amoroso, E.: Intrusion Detection. intrusion.net books, P.O. Box 78, Sparta, New Jersey 07871 (1999),
http://www.intrusion.net
2. Axelsson, S.: The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security (TISSEC) 3(3), 186–205 (2000)
3. Axelsson, S.: Intrusion-detection systems: A Taxonomy and Survey. Technical Report 99–15, Department of Computer Engineering, Chalmers University of Technology, SE–412 96, Göteborg, Sweden (March 2000)
4. Bace, R.: Intrusion Detection, 1st edn. Macmillan Technical Publishing, Basingstoke (December 1999) ISBN 1-57-870185-6
5. Braithwaite, R.: The ’pubstro’ Phenomenon: Robin Hoods of the Internet. Verified: July 24 (2003), Avaliable as:
http://www.deakin.edu.au/infosys/docs/seminars/-handouts/RichardBraithwaite.pdf