1. Abu-Nimeh S, Nappa D, Wang X, Nair S (2007) A comparison of A.I. techniques for phishing detection. In: eCrime ’07: Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit, ACM, New York, USA, pp 60–69
2. Ajendaro P (2004) A.I. techniques in masquerade detection, Master’s thesis, University of California, Davis
3. Anderson JP (1980) Computer security threat monitoring and surveillance. In: Technical report published by James P Anderson Co., Fort Washington, April
4. Axelson S (1998) Research in intrusion detection systems: a survey. Chalmers University of Technology, Goteborg, technical report
5. Barbard D, Wu N, Jajodia S (2001) Detecting novel network intrusion using bayes estimators. In: Proceedings of the first SIAM international conference on data mining, pp 24–29