1. Lee, W., Stolfo, S., Chan, P.K.: Learning patterns from unix process execution traces for intrusion detection. In: Proc. of AAAI 1997 Workshop on AI Methods in Fraud and Risk Management (1997)
2. Vigna, G., Kemmerer, R.A.: Netstat: A network-based intrusion detection approach. In: Proc. of the 1998 Annual Computer Security Applications Conference (ACSAC 1998), Los Alamitos, CA, December 1998, pp. 25–34. IEEE Computer Society, Los Alamitos (1998)
3. Porras, P.A., Neumann, P.G.: Emerald: Event monitoring enabling responses to anomalous live disturbances. In: Proc. of the 20th National Information Systems Security Conference, October 1997, pp. 353–365 (1997)
4. Ghosh, A.K., Wanken, J., Charron, F.: Detecting anomalous and unknown intrusions against programs. In: Proc. of the 1998 Annual Computer Security Applications Conference (ACSAC 1998) (December 1998)
5. Labib, K., Vemuri, R.: TNSOM: A real-time network-based intrusion detection system using self-organizing maps, Technical report, Dept. of Applied Science, University of California, Davis (2002)