1. Abraham A, Jain R (2004) Soft computing models for network intrusion detection systems. http://arxiv.org/ftp/cs/papers/0405/0405046.pdf . Accessed 15 May 2008
2. Abraham A, Jain R, Sanyal S, Han SY (2004) Scids: a soft computing intrusion detection system. In: 6th international workshop on distributed computing (IWDC 2004). Springer, Berlin, pp 252–257
3. Abraham A, Jain R, Thomas J, Han SY (2007a) D-scids: distributed soft computing intrusion detection system. J Network Comput Appl 30:81–98
4. Abraham A, Grosan C, Martin-Vide C (2007b) Evolutionary design of intrusion detection programs. Int J Network Security 4(3):328–339
5. Acohido B (2009) Hackers breach heartland payment credit card system. http://www.usatoday.com/money/perfi/credit/2009-01-20-heartland-credit-card-security-breach_N.htm . Accessed 11 March 2009