1. Kabiri, P., Ghorbani, A.A.: Research on Intrusion Detection and Response: A Survey. International Journal Network Security 1, 84–102 (2005)
2. Patcha, A., Park, J.M.: An overview of anomaly detection techniques: existing solutions and latest technological trends. Computer Networks 51, 3448–3470 (2007)
3. Lee, W., Xiang, D.: Information-Theoretic Measures for Anomaly Detection. In: Proceeding of the IEEE Symposium on Security and Privacy (2001)
4. Nyalkalkar, K., Sinha, S., Bailey, M., Jahanian, F.: A Comparative Study of Two Network-based Anomaly Detection Methods. In: Proceeding of the INFOCOM (2011)
5. Gu, Y., McCallum, A., Towsley, D.: Detecting anomalies in network traffic using maximum entropy estimation. In: Proceeding of the 5th ACM SIGCOMM Conference on Internet Measurement, pp. 345–350. USENIX Association, Berkeley (2005)