1. Satti, M.M., Gamer, B.J., Nagrial, M.H.: Information security standard for E businesses. In: Proc. 8th Intl. Conf. on Commun. System, vol. 2, pp. 641–645 (2008)
2. Mashima, D., Ahamad, M.: Using Identity Credential Usage Logs to Detect Anomalous Service Accesses. DIM, Chicago (2009)
3. Lecture Notes in Computer Science;P.D. Williams,2001
4. Lecture Notes in Computer Science;J. Greensmith,2006
5. Hofmeyr, S.A., Forrest, S.: Architecture for an artificial immune system. Evolutionary Computation 7(1), 45–68 (2000)