1. Hunteman, W.: Automated information system – (AIS) alarm system. In: Proc. of the 20th NIST-NCSC National Information Systems Security Conference, pp. 394–405 (1997)
2. Staniford-Chen, S., Cheung, S., Crawford, R., et al.: GrIDS: a graph based intrusion detection system for large networks. In: Proc. of the 19th National Information Systems Security Conference, National Institute of Standards and Technology, vol. 1, pp. 361–370. (1996)
3. Porras, P.A., Neumann, P.G.: EMERALD: event monitoring enabling responses to anomalous live disturbances. In: Proc. of the 20th National Information Systems Security Conference, National Institute of Standards and Technology, p. 13 (1997)
4. Spafford, E.H.: Intrusion detection using autonomous agent. Computer Networks 3(4), 547–570 (2000)
5. Dasgupta, D., Brian, H.: Mobile security agent for network traffic analysis. In: Proc. of DARPA Information Survivability Conference and Exposition II (DISCEX-II), Anaheium, CA, pp. 332–340 (June 2001)