1. Allen, J., Christie, A., Fithen, W., McHugh, J., Pickel, J., Stoner, E.: State of the practice of intrusion detection technologies (2000), http://www.sei.cmu.edu/pub/documents/99.reports/pdf/99tr028.pdf
2. Anderson, J.: Computer security threat monitoring and surveillance (1980), http://csrc.nist.gov/publications/history/ande80.pdf
3. Beale, J.: Snort, IDS and IPS toolkit, p. 297. Syngress Publishing Inc., Canada (2007)
4. Cannady, J.: Artificial neural network for misuse detection (1998), http://csrc.nist.gov/nissc/1998/proceedings/paperF13.pdf
5. Cannady, J., Mahaffey, J.: The application of artificial neural networks to misuse detection (1999), http://freeworld.thc.org/root/docs/intrusion_detection/nids/Application-of-ANN-to-Misuse-Detection.pdf