1. Lee, W., Xiang, D.: Information-Theoretic Measures for Anomaly Detection. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 130–143. IEEE Computer Society Press, Oakland (2001)
2. Anderson, D., Frivold, T., Valdes, A.: Next-Generation intrusion Detection Expert System (NIDES): A Summary. Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International, Menlo Park, California (1995)
3. Schonlau, M., Theus, M.: Detecting Masquerades in Intrusion Detection Based on Unpopular Commands. Information Processing Letters 76, 33–38 (2000)
4. Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A Sense of Self for Unix Processes. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 120–128. IEEE Computer Society Press, Oakland (1996)
5. Lee, W., Stolfo, S.: Data Mining Approaches for Intrusion Detection. In: Proceedings of the 7th USENIX Security Symposium, Usenix Association, San Antonio, Texas, pp. 79–94 (1998)