1. Vaccaro, H.S., Liepins, G.E.: Detection of anomalous computer session activity. In: Proceedings of IEEE Symposium on Research in Security and Privacy, pp. 280–289 (1989)
2. Axelsson, S.: Intrusion detection systems: A survey and taxonomy. Technical Report 99-15, Department of Computer Engineering, Chalmers University (March 2000)
3. Biermann, E., Cloete, E., Venter, L.M.: A comparison of intrusion detection systems. Computers & Security 20(8), 676–683 (2001)
4. Dowel, C., Ramstedt, P.: The computer watch data reduction tool. In: Proceedings of the 13th National Computer Security Conference, Washington DC, USA, October 1990, pp. 99–108 (1990)
5. Heberlein, T., Dias, G., Levitt, K., Mukherjee, B., Wood, J., Wolber, D.: A network security monitor. In: Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, Los Alamitos, CA, USA, pp. 296–304 (1990)