1. Kumar, S., Spafford, E.H.: A Software architecture to support misuse intrusion detection. In: Proceedings of the 18th National Information Security Conference, pp. 194–204 (1995)
2. Beale, J.: Snort 2.1 Intrusion Detection. Syngress (2004)
3. Anderson, J. P.: Computer Security Threat Monitoring and Surveillance. Technical report, James. P. Anderson Co., Fort Washington, Pennsylvania (1980)
4. Denning, D.: An intrusion detection model. IEEE Trans. Software Eng. 13(2), 222–232 (1987)
5. Lunt, T., Tamaru, A., Gilham, F.: A Real-time Intrusion Detection Expert System (IDES) Final Technical Report. Computer Science Laboratory. SRI International, Menlo Park, California (1992)