1. Fayyad, U.M., Piatetsky-Shapiro, G., Smyth, P., Uthurusamy, R.: Advances in Knowledge Discovery and Data Mining. AAAI/MIT Press, London (1996)
2. Lee, W., Stolfo, S.J., Mok, K.W.: Data mining approaches for intrusion detection. In: 7th USENIX Security Symposium, San Antonio, TX (1998)
3. HajHmida, M.B., Congiusta, A.: Parallel, Distributed, and Grid-Based Data Mining: Algorithms, Systems, and Applications. In: Cannataro, M. (ed.) Handbook of Research on Computational Grid Technologies for Life Sciences, Biomedicine and Healthcare. Medical Information Science Reference, pp. 90–119 (2009)
4. Kemmerer, R.A., Vigna, G.: Intrusion Detection: A Brief History and Overview. Part supplement IEEE Computer 35(4), 27–30 (2002)
5. Tront, J.G., Marchany, R.C.: Internet security: intrusion detection & prevention. In: Proc. of the 37th Annual Hawaii International Conference on System Sciences, vol. 1 (2004)