1. Agrawal, R., Imielinski, T., & Swami, A. (1993). Mining association rules between sets of items in large databases. In ACM SIGMOD (pp. 207–216).
2. Agrawal, R., & Srikant, R. (1994). Fast algorithms for mining association rules. In International conference on very large data bases.
3. Anderson, D., Lunt, T. F., Javitz, H., Tamaru, A., & Valdes, A. (1995). Detecting unusual program behavior using the statistical component of the next generation intrusion detection expert system (nides). Technical Report SRI-CSL-95-06, Computer Science Laboratory SRI.
4. Barbara, D., Couto, J., Jajodia, S., Popyack, L., & Wu, N. (2001). Adam: detecting intrusions by data mining. In IEEE workshop on information assurance and security.
5. Bhatkar, S., Chaturvedi, A., & Sekar, R. (2006). Dataflow anomaly detection. In IEEE symposium on security and privacy.