1. The 2004 E-Crime Watch survey (2004), available at:
http://www.csoonline.com/releases/ecrimewatch04.pdf
2. Kumar, S., Spafford, E.H.: A Software Architecture to Support Misuse Intrusion Detection. In: Proceedings of the 18th National Information Security Conference, pp. 194–204 (1995)
3. Forrest, S., Hofmeyr, S.A., Somayaji, A., Logstaff, T.A.: A Sense of Self for Unix process. In: Proceedings of 1996 IEEE Symposium on Computer Security and Privacy, pp. 120–128 (1996)
4. Ilgun, K., Kemmerer, R.A., Porras, P.A.: State Transition Analysis: A Rule- Based Intrusion Detection System. IEEE Transactions on Software Engineering 21(3), 181–199 (1995)
5. Javitz, H.S., Valdes, A.: The SRI IDES Statistical Anomaly Detector. In: IEEE Symposium on Security and Privacy, May 1991, SRI International, Oakland (1991)