1. Warrender, C., Forrest, S., Pearlmutter, B.: Detecting Intrusions using System Calls: Alternative Data Models. In: 1999 IEEE Symposium on Security and Privacy, pp. 133–145. IEEE Computer Society Press, Los Alamitos (1999)
2. Petroni, N.L., Fraser, T., Molina, J., Arbaugh, W.A.: Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor. In: 13th Conference on USENIX Security Symposium (2004)
3. Roesch, M.: Snort: Lightweight Intrusion Detection for Networks. In: 13th USENIX Conference on Systems Administration, pp. 229–238 (1999)
4. Kim, G.H., Spafford, E.H.: The Design and Implementation of Tripwire: A File System Integrity Checker. In: 2nd ACM Conference on Computer and Communications Security, pp. 18–29. ACM Press, New York (1994)
5. AIDE: Advanced Intrusion Detection Environment.
http://www.cs.tut.fi/~rammer/aide.html