1. Allman, M., Paxson, V., Terrell, J.: A brief history of scanning. In: Proceedings the 7th ACM SIGCOMM Conference on Internet Measurement (2007)
2. Axelsson, S.: The base-rate fallacy and the difficulty of intrusion detection. ACM Trans. Inf. Syst. Secur. (TISSEC). 3(3), 186–205 (2000)
3. Bro intrusion detection system. http://bro-ids.org/ . Accessed May 2010
4. Casado, M., Freedman, M.J.: Peering through the shroud: the effect of edge opacity on IP-based client identification. In: 4th USENIX Symposium on Networked Systems Design and Implementation (NDSS’07) (2007)
5. Coull, S.E., Wright, C.V., Monrose, F., Collins, M.P., Reiter, M.K.: Playing devil’s advocate: inferring sensitive information from anonymized network traces. In: NDSS (2007)