1. Warrender, C., Forrest, S., Pearlmutter, B.: Detecting Intrusions Using System Calls: Alternative Data Models. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, May 1999, pp. 133–145 (1999)
2. Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A Sense of Self for UNIX Processes. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, May 1996, pp. 120–128 (1996)
3. Hai, J., Jianhua, S., Hao, C., Zongfen, H.: A Fuzzy Data Mining Based Intrusion Detection Model. In: Proceedings of the 10th IEEE International Workshop on Future Trends, Distributed Computing Systems, 2004. FTDCS 2004, May 26-28, pp. 191–197 (2004)
4. Lee, W., Stolfo, S.J.: Data Mining Approaches for Intrusion Detection. In: Proceedings of the Seventh USENIX Security Symposium, January 1998, pp. 79–93 (1998)
5. Wenke, L., Stolfo, S.J., Mok, K.W.: A Data Mining Framework for Building Intrusion Detection Models. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, May 1999, pp. 120–132 (1999)