1. Axelsson, S.:Intrusion Detection Systems: A Survey and Taxonomy’. Technical Report 99.15 Dept. of Computer Engineering, Chalmers University of Technology, Sweden (2000)
2. Burgess, M., Haugerud, H., Straumsnes, S., Reitan, T.: Measuring system normality. ACM Transactions on Computer Systems 20(2), 125–160 (2002)
3. Chung, Yip, C., Gertz, M., Levitt, K.: DEMIDS: A misuse detection system for database systems. In: IFIP WG11.5 3rd Working Conference on Integrity and Internal Control in Information Systems, pp. 159–178. Kluwer Academic Publishers, Dordrecht (1999)
4. Gao, D., Reiter, M.K., Song, D.: Gray-box extraction of execution graphs for anomaly detection. In: 11th ACM Conference on Computer and Communications Security, pp. 318–329. ACM Computer Press, New York (2004)
5. Gertz, M.: Data Content Monitoring for Security, Integrity and Availability: A Mission-Critical Line of Defense. In: IICIS 2002: IFIP WG11.5 5th Working Conference on Integrity and Internal Control in Information Systems, pp. 189–201. Kluwer Academic Publishers, Dordrecht (2003)