1. Agrawal, R., Imielinski, T., Swami, A.: Mining Association Rules Between Sets of Items in Large Databases. In: Proceedings of the International Conference on Management of Data, Washington, D.C, pp. 207–216 (1993)
2. Ben Yahia, S., Gasmi, G., Nguifo, E.M.: A New Generic Basis of Factual and Implicative Association rules. Intelligent Data Analysis 13(4), 633–656 (2009)
3. Bouzida, Y., Cuppens, F.: Detecting known and novel network intrusion. In: Proceedings of the 21st IFIP International Conference on Information Security, Karlstad, Sweden, pp. 258–270 (2006)
4. Brahmi, I., Yahia, S.B., Poncelet, P.: A Snort-Based Mobile Agent For A Distributed Intrusion Detection System. In: Proceedings of the International Conference on Security and Cryptography, Seville, Spain (to appear, 2011)
5. Brahmi, I., Yahia, S.B., Poncelet, P.: $\mathcal{AD}$ - $\mathcal{C}$ lust: Détection des Anomalies Basée sur le Clustering. In: Atelier Clustering Incrémental et Méthodes de Détection de Nouveauté en conjonction avec 11ème Conférence Francophone d’Extraction et de Gestion de Connaissances EGC 2011, Brest, France, pp. 27–41 (2011)