1. Winkler, J.R., Page, W.J.: Intrusion and Anomaly Detection In Trusted Systems. In: Proceeding of the Fifth Annual Computer Security Applications Conference, Tucson, AZ (December 1989)
2. Anderson, D., Frivold, T., Valdes, A.: Next-Generation Intrusion Detection ExpertSystem (NIDES) A Summary. Technical Report, SRI-CSI-95-07, SRI International, Computer Science Lab (May 1995)
3. Teng, H.S., Chen, K., Lu, S.C.: Adaptive real-time anomaly detection using inductively generated sequential patterns. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland CA, pp. 278–272 (May 1990)
4. Lee, W.: A data mining for constructing features and models for intrusion detection system. Ph.D. Dissertation, Columbia University (1999)
5. William, P.D., et al.: CDIS: Towards a Computer Immune System for Detecting Network Intrusions (2001)