1. D’ Ambrosio, B, M. Takikawa, D. Upper, J. Fitzgerald, and S. Mahoney, “Security Situation Assessment and Response Evaluation,” Proceedings (DISCEX II) DARPA Information Survivability Conference and Exposition, Anaheim, CA, Vol. I, June 2001.
2. D.W. Baker, S.M. Christey, W.H. Hill, and D.E. Mann, “The Development of a Common Enumeration of Vulnerabilities and Exposures,” Proceedings of the Second International Workshop on Recent Advances in Intrusion Detection (RAID), September 1999.
3. Bugtraq. Security Focus Online. http://online.securityfocus.com/archive/1
4. CERT Coordination Center. Cert/CC Advisories Carnegie Mellon, Software Engineering Institute. Online. http://www.cert.org/advisories/
5. F. Cuppens, “Managing Alerts in a Multi-Intrusion Detection Environment,” Proceedings 17th Computer Security Applications Conference, New Orleans, LA, December 2001.