1. Ryan J, Lin M-J, Miikkulainen R (1998) Intrusion Detection with Neural Networks. Advances in Neural Information Processing Systems 10, Cambridge, MA: MIT Press
2. Kumar S, Spafford EH (1994) An Application of Pattern Matching in Intrusion Detection. Technical Report CSD-TR-94–013. Purdue University
3. Luo J, Bridges SM (2000) Mining Fuzzy Association Rules and Fuzzy Frequency Episodes for Intrusion Detection. International Journal of Intelligent Systems, John Wiley & Sons, pp 15: 687–703
4. Demuth H, Beale M (2000) Neural Network Toolbox User’s Guide. MathWorks, Inc. Natick, MA
5. Sung AH (1998) Ranking Importance Of Input Parameters Of Neural Networks. Expert Systems with Applications, pp 15: 405–411.