1. Anderson, R., Khattak, A.: The Use of Information Retrieval Techniques for Intrusion Detection. In: Proceedings of RAID (September 1998)
2. Network Associates. LovGate Virus Summary, http://vil.nai.com/vil/content/Print100183.htm (2002)
3. Bullard, C.: Argus Open Project, http://www.qosient.com/argus/
4. Cranor, C., Gao, Y., Johnson, T., Shkapenyuk, V., Spatscheck, O.: Gigascope: High Performance Network Monitoring with an SQL Interface
5. E-eye. Analysis: Sasser Worm, http://www.eeye.com/html/Research/Advisories/AD20040501.html