1. Axelsson, S.: The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security (TISSEC) 3(3), 186–205 (1981)
2. Fried, D.J., Graf, I., Haines, J.W., Kendall, K.R., Mcclung, D., Weber, D., Webster, S.E., Wyschogrod, D., Cunningham, R.K., Zissman, M.A.: Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation. In: Proceedings of the 2000 DARPA Information Survivability Conference and Exposition, pp. 12–26 (2000)
3. Linda, O., Vollmer, T., Manic, M.: Neural Network Based Intrusion Detection System for Critical Infrastructures. In: Proceedings of International Joint Conference on Neural Networks, pp. 1827–1834 (2009)
4. ch. 3-5, 9;M. Stamp,2011
5. Ferguson, N., Schneier, B., Kohno, T.: Cryptography Engineering, ch. 3-7 (2010)