1. Ayutyanont, N.: Statistical Characteristics and Models of Cyber Attack and Norm Data for Cyber Attack Detection. Ph.D. Dissertation. Arizona State University, Tempe, AZ, USA (2007)
2. Calo, S., Wood, D., Zerfos, P., Vyvyan, D., Dantressangle, P., Bent, G.: Technologies for Federation and Interoperation of Coalition Networks. In: Proceedings of 12th International Conference on Information Fusion, Seattle (2009)
3. Casas, P., Mazel, J., and Owezarski, P.: Unsupervised network intrusion detection systems: Detecting the unknown without knowledge. Comput. Comm. 35(7), 772–783 (2012)
4. Chora, M., DAntonio, S., Kozik, R., Holubowicz, W.: INTERSECTION Approach to Vulnerability Handling. In: Proceedings of 6th International Conference on Web Information Systems and Technologies, WEBIST 2010, vol. 1, pp. 171–174. INSTICC Press, Valencia (2010)
5. Choraś, M., Kozik, R. Network Event Correlation and Semantic Reasoning for Federated Networks Protection System. In Computer Information Systems Analysis and Technologies. Springer, Berlin Heidelberg, 48–54 (2011)