1. Mell, P., Marks, D., McLarnon: A denial-of-Service. Computer Networks 34, 641 (2000)
2. Ditrich, S.: Analyzing Distributed Denial of Service Tools: The Shaft Case. In: Proc of the 14th Systems Administration Conference-LISA 2000, New Orleans, USA, pp. 329–339 (2000)
3. Ryan, J., Lin, M.J., Miikkulainen, R.: Intrusion Detection with Neural Networks. In: Jordan, M., et al. (eds.) Advances in Neural Information Processing Systems 10, pp. 943–949. MIT Press, Cambridge (1998)
4. Mukkamala, S., Janoski, G., Sung, A.: Intrusion Detection using Neural Networks and Support Vector Machines. In: Proc. IJCNN, vol. 2, pp. 1702–1707 (2002)
5. Bonifacio, J., Casian, A.: Neural Networks Applied in Intrusion Detection Systems. In: Proc. Word Congress on Computational Intelligence - WCCI, Anchorage, USA, pp. 205–210 (1998)