1. R. Agrawal, T. Imielinski, and A. Swami. Mining association rules between sets of items in large databases. In Proc. of the ACM SIG-MOD Conference on Management of Data, Washington D.C., May 1993.
2. D. Anderson and T. Frivold and A. Valdes. NIDES: A Summary. In
http://www.sdl.sri.com/nides/index5.html
3. D. Anderson and T. Lunt and H. Javitz and A. Tamaru and A. Valdes. Detecting unusual program behavior using the statistical component of the Next-generation Intrusion Detection Expert System (NIDES). Technical Report, SRI-CSL-95–06, Computer Science Laboratory, SRI International, May 1995.
4. D. Barbará and J. Couto and S. Jajodia and N. Wu. ADAM: Detecting Intrusions by Data Mining. Proceedings of the IEEE SMC Information Assurance Workshop, West Point, NY, 2001.
5. D. Barbará and N. Wu and S. Jajodia. Detecting Novel Network Intrusions Using Bayes Estimators. Proceedings of the First SIAM International Conference on Data Mining, April 2001, Chicago, USA.