1. Ammann, P., Wijesekera, D., Kaushik, S.: Scalable, graph-based network vulnerability analysis. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington DC, pp. 217–224 (November 2002)
2. Chinchani, R., Upadhyaya, S., Kwiat, K.: Towards the scalable implementation of a user level anomaly detection system. In: Proceedings of the 2002 IEEE MILCOM Conference, Anaheim, CA, vol. 2, pp. 7–10 (October 2002)
3. Dawkins, J., Campbell, C., Hale, J.: Modeling network attacks: Extending the attack tree paradigm. In: Proceedings of the Workshop on Statistical Machine Learning Techniques in Computer Intrusion Detection Baltimore. Johns Hopkins University (June 2002)
4. Denning, D., Neumann, P.: Requirements and model for ”ides” - ”a” real-time intrusion detection expert system. Technical report, Technical Report, Computer Science Laboratory, SRI International (1985)
5. The SANS Institute. Intrusion detection faq (April 2004), Available at
http://www.sans.org/resources/idfaq