1. Mounji, A., Charlier, B.L., Zampuniéris, D., Habra, N.: Distributed audit trail analysis. In: Balenson, D., Shirey, R. (eds.) Proceedings of the ISOC 1995 symposium on network and distributed system security, pp. 102–112. IEEE Computer Society, Los Alamitos (1995)
2. Lindqvist, U., Porras, P.A.: Detecting computer and network misuse through the production-based expert system toolset (PBEST). In: Gong, L., Reiter, M. (eds.) Proceedings of the 1999 IEEE symposium on security and privacy, pp. 146–161. IEEE Computer Socitey, Los Alamitos (1999)
3. Ilgun, K., Kemmerer, R.A., Porras, P.A.: State transition analysis: A rule-based intrusion detection approach. IEEE Transactions on Software Engineering 21(3), 181–199 (1995)
4. Neri, F.: Comparing local search with respect to genetic evolution to detect intrusions in computer networks. In: Proceedings of the 2000 Congress on Evolutionary Computation, Mar-seille, France, July 2000, vol. 1, pp. 238–243. IEEE, Los Alamitos (2000)
5. Guan, J., Liu, D.X., Cui, B.G.: An induction learning approach for building intrusion detection models using genetic algorithms. In: Proceedings of Fifth World Congress on Intelligent Control and Automation WCICA, vol. 5, pp. 4339–4342. IEEE, Los Alamitos (2004)