1. Stallings W, Brown L (2008) Computer security principals and practice. Pearson Education, Upper Saddle River
2. C. S. Institute and F. Investigation (2005) In: Proceedings of the 10th annual computer crime and security survey
3. Anderson JP (1980) Computer security threat monitoring and surveillance. James P. Anderson Co., Fort Washington
4. Debar H, Dacier M, Wespi A (2000) A revised taxonomy for intrusion detection systems. Ann Telecommun 55(7):361–378
5. Stallings W (2006) Cryptography and network security principles and practices. Prentice Hall, Englewood Cliffs