1. Gooi, P., et al.: A Survey of Outlier Detection Methods in Network Anomaly Identification (2011).
http://www.cs.uccs.edu/~jkalita/papers/2011/GogoiPrasantaComputerJournal.pdf
2. Rene Beulah, J.: Applying outlier detection techniques in anomaly-based network intrusion systems – a theoretical analysis. In: International Journal of Computer Applications (0975 – 8887), International Seminar on Computer Vision, ISCV 2013, pp. 6–9 (2013)
3. García-Teodoro, P., Díaz-Verdejo, J., Maciá-Fernández, G., Vázquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1–2), 18–28 (2009)
4. Depren, O., Topallar, M., Anarim, E., Kemal Ciliz, M.: An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert Syst. Appl. 29, 713–722 (2005). Elsevier
5. Manandhar, P., Aung, Z.: Intrusion detection based on outlier detection method. In: International Conference on Intelligent Systems, Data Mining and Information Technology, ICIDIT 2014, Bangkok, Thailand, 21–22 April 2014