1. R. K. Cunningham, R. P. Lippmann, D. J. Fried, S. L. Garfinkel, I. Graf, K. R. Kendall, S. E. Webster, D. Wyschogrod, M. A. Zissman, “Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation,” SANS, 1999.
2. Ebert, D., Shaw, C, Zwa, A., and Starr, C. “Two-handed Interactive Stereoscopic Visualization,” IEEE Visualization’ 96 1996.
3. Ebert, D, Kukla, J., Shaw, C, Zwa, A., Soboroff, I., and Roberts, DA., “Automatic Shape Interpolation for Glyph-based Information Visualization,” IEEE Visualization 97 Late Breaking Hot Topics, October 1997, Phoenix, AZ.
4. K. Kendall, “A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems”, S. M. Thesis, MIT Department of Electrical Engineering and Computer Science, June 1999.
5. Richard P. Lippmann, David J. Fried, Isaac Graf, Joshua W. Haines, Kristopher R. Kendall, David McClung, Dan Weber, Seth E. Webster, Dan Wyschogrod, Robert K. Cunningham, and Marc A. Zissman, “Evaluating Intrusion Detection Systems: The 1998 DARPA Off-Line Intrusion Detection Evaluation,” in Proceedings of the 2000 DARPA Information Survivability Conference and Exposition, 2000, Vol 2.