1. Bace RG. Intrusion detection. Macmillan Technical Publishing; 2000.
2. Lunt T, Halme L, Van Horne J. Automated analysis of computer system audit trails for security purposes. In: Thirteenth National Computer Security Conference; 1990.
3. Skardhamar R. Virus: detection and elimination. In: AP Professional; 1996.
4. Koral I. Ustat: a real-time intrusion detection system for unix. In: IEEE Symposium on Research in Security and Privacy; 1993.
5. Vaccaro HS, Liepins GE. Detection of anomalous computer session activity. In: IEEE Symposium on Research in Security and Privacy; 1989.