1. Aben, E. et al. The CAIDA UCSD Network Telescope Two Days in November 2008 Dataset. (Access Date: Dec. 2013).
2. Bell, T. C., Cleary, J. G., and Witten, I. H. Text Compression. Prentice Hall, 1990.
3. Chakrabarti, A., and Manimaran, G. Internet infrastructure security: a taxonomy. IEEE Network, 16(6):13–21, Nov/Dec 2002.
4. Cheng, B.-C., Liao, G.-T., Huang, C.-C., and Yu, M.-T. A novel probabilistic matching algorithm for multi-stage attack forecasts. IEEE Transactions on Selected Areas in Communications, 29(7):1438–1448, 2011.
5. Cheung, S., Lindqvist, U., and Fong, M. W. Modeling multistep cyber attacks for scenario recognition. In Proceedings of DARPA Information Survivability Conference and Exposition, volume 1, pages 284–292, April 2003.