1. S. Axelsson. Intrusion Detection Systems: A Survey and Taxonomy. Technical Report 99-15, Depart. of Computer Engineering, Chalmers University, march 2000.
2. CERT Coordination Center. Advisory CA-1996-16-Vulnerabilities in Solaris admintool.
http://www.cert.org/advisories/CA-1996-16.html
.
3. S. C. Chakravarthy, V. Krishnaprasad, E. Anwar, and S.-K. Kim. Composite Events for Active Databases: Semantics, Contexts and Detection. In Proc. of the 20th International Conference on Very Large DataBases (VLDB94), 1994.
4. Lect Notes Comput Sci;F. Cuppens,2001
5. S. T. Eckmann, G. Vigna, and R. A. Kemmerer. STATL: An Attack Language for State-based Intrusion Detection. In Proc. of ACM Workshop on Intrusion Detection, Athens, Greece, Nov 2000.