1. Undercoffer. J, Joshi. A, Pinkston. J, Modeling Computer Attacks: An Ontology for Intrusion Detection, Springer, pp. 113–135, 2003.
2. J. Undercoffer, A. Joshi,, T. Finin, and John Pinkston, “A target centric ontology for intrusion detection: using DAML+OIL to classify intrusive behaviors”, Knowledge Engineering Review, Cambridge University Press, pp. 23-29, January, 2004.
3. V. Raskin, C. Helpenmann, K. Triezenberg, and S. Nirenburg, “Ontology in information security: a useful theoretical foundation and methodological tool”, New Security Paradigms Workshop, ACM Press, pp. 53-59, Cloudcroft, NM, 2001.
4. Gomez J., Dasgupta D., “Evolving Fuzzy Classifiers for Intrusion Detection”, Proceeding Of 2002 IEEE Workshop on Information Assurance, United States Military Academy, West Point NY, June 2001.
5. Guan Y., Ghorbani A. And Belacel N., “Y-means: A Clustering Method for Intrusion Detection”, Proceedings of Canadian Conference on Electrical and Computer Engineering. Montreal, Quebec, Canada. May 4-7, 2003.