1. Snort rules documentation. http://www.snort.org
2. Almgren, M., Lindqvist, U., Jonsson, E.: A multi-sensor model to improve automated attack detection. In: 11th International Symposium on Recent Advances in Intrusion Detection (RAID 2008). RAID, September 2008
3. Axelsson, S.: The base-rate fallacy and the difficulty of intrusion detection. ACM Trans. Inf. Syst. Secur. 3(3), 186–205 (2000)
4. Barreno, M., Cárdenas, A.A., Tygar, J.D.: Optimal ROC curve for a combination of classifiers. In: Advances in Neural Information Processing Systems (NIPS, 2007) (2008)
5. Carrier, B.: A hypothesis-based approach to digital forensic investigations. Technical report, Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University (2006)