1. Lecture Notes in Computer Science;C. Krügel,2003
2. Mahoney, M., Chan, P.: Learning rules for anomaly detection of hostile network traffic. In: ICDM 2003: Third IEEE International Conference on Data Mining, Washington, DC, USA, pp. 601–604. IEEE Computer Society, Los Alamitos (2003)
3. Lewis, L.: A case based reasoning approach to the managment of faults in communications networks. In: IEEE INFOCOM, San Francisco, CA, vol. 3, pp. 1422–1429 (March 1993)
4. Lecture Notes in Computer Science;K.S. Bon,2005
5. Lazar, A., Wang, W., Deng, R.: Models and algorithms for network fault detection and identification: A review. In: ICC, Singapore (November 1992)