1. Anderson R., Feldman P., Gerwehr S., Houghton B., Mesic R., Pinder J., Rothenberg J., and Chiesa J. (1999). “Securing the U.S. Defense Information Infrastructure: A Proposed Approach.” MR-993-OSD/NSA/DARPA. www.rand.org/publications/electronic/info.html
2. Balasubramaniyan J., Jose Omar Garcia-Fernandez, Spafford E., and Zamboni D. “An Architecture for Intrusion Detection using Autonomous Agents”. Department of Computer Sciences, Purdue University; Coast TR 98-05; 1998.
3. Briney A., “Security Focused”, Online report on Information system security, from http://www.infosecuritymag.com 2000.
4. Carver C.A., Hill J.M, Surdu J.R., and Pooch U.W., “A Methodology for using Intelligent Agents to provide Automated Intrusion Response,” IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, West Point, NY, June 6–7 2000, pp. 110–116.
5. Cohen F., “50 Ways to Defeat your Intrusion Detection System”, onlien paper at http://all.net/journal/netsec/1997-12.html.