1. Almgren (M.), Debar (H.), Dacier (M.), A lightweight tool for detecting web server attacks,in Symposium on Network and Distributed Systems Security (NDSS ’00), pp. 157–170, San Diego, CA, February 2000, Internet Society.
2. Anderson (T.), Avizienis (A.), Carter (W.C.), Costes (A.), Cristian (F.), Koga (Y.), Kopetz (H.), Lala (J.H.), Laprie (J.C.), Meyer (J.F.), Randell (B.), Robinson (A.S.), Simonici (L.), Voges (U.),Dependability: Basic Concepts and Terminology, Dependable Computing and Fault Tolerance. Springer-Verlag, Berlin Germany, 1992.
3. Steven (M.), Bellovin, William (R.), Cheswick. Network firewalls,IEEE Communications Magazine, 32 (9): pp. 50–57, September 1994.
4. Cannady (J.), Harrel (J.), A comparative analysis of current intrusion detection technologies, inProceedings of the fourth Technology for Information Security Conference ’96 (TISC’96), Houston, TX, May 1996.
5. Syslog vulnerability a workaround for sendmail. Cert Coordination Center, Available by anonymous ftp from ftp.cert.org, October 1995.