1. Goubault-Larrecq, J.: Un algorithme pour l’analyse de logs. Research Report LSV-02-18, Lab. Specification and Verification, ENS de Cachan, Cachan, France, 33 pages (November 2002)
2. Goubault-Larrecq, J., Pouzol, J.-P., Demri, S., Mé, L., Carle, P.: Langages de détection d’attaques par signatures. Sous-projet 3, livrable 1 du projet RNTL DICO. Version 1, 30 pages (June 2002)
3. Morton, A., Starzetz, P.: Linux kernel do_brk function boundary condition vulnerability. References CAN-2003-0961 (CVE), BugTraq Id 9138 (December 2003),
http://www.securityfocus.com/bid/9138
4. Olivain, J.: ORCHIDS—real-time event analysis and temporal correlation for intrusion detection in information systems (2004),
http://www.lsv.ens-cachan.fr/orchids/
5. Purczyński, W.: Linux kernel privileged process hijacking vulnerability. BugTraq Id 7112 (March 2003),
http://www.securityfocus.com/bid/7112