1. Axelsson (S.), Intrusion Detection Systems: A Survey and Taxonom.Technical report 99–15, Dept. of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden, March 2000.
2. Cabrera (J.),Ravichandran (B.),Mehra (R.), Statistical Traffic Modeling for Network Intrusion Detection. Proceedings of theEighth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, Aug. 2000.
3. Uppuluri (P.),Sekar (R.), Experiences with Specification-Based Intrusion Detection. Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection, 2001, pp. 172–189.
4. Oppenheimer (D.),Martonosi (M.), Performance Signatures: A Mechanism for Intrusion Detection. Proceedings of the 1997Ieee Information Survivability Workshop, 1997.
5. Shah (H.),Undercoffer (J.),Joshi (A.), Fuzzy Clustering for Intrusion Detection,Fuzz-ieee, 2003