1. Albayrak, S., Müller, A., Scheel, C., Milosevic, D.: Combining Self-Organizing Map Algorithms for Robust and Scalable Intrusion Detection. In: Mohammadian, M. (ed.) Proceedings of International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005 Book 2), Vienna, Austria, pp. 123–130 (2005)
2. Bundesamt für Sicherheit in der Informationstechnik. Critical infrastructures in state and society (2006-05-16), http://www.bsi.de/fachthem/kritis/kritis_e.htm
3. Bundesamt für Sicherheit in der Informationstechnik. Certification Report BSI-DSZ-CC-0248-2005 for Java Intelligent Agent Componentware IV Version 4.3.11 from DAI- Labor Technische Universität Berlin (2005), http://www.bsi.de/zertifiz/zert/reporte/0248a.pdf
4. DAI-Labor. Security Target Java Intelligent Agent Componentware IV (2004), http://www.bsi.de/zertifiz/zert/reporte/0248b.pdf
5. Ellison, R.J., Fisher, D.A., Linger, R.C., Lipson, H.F., Longstaff, T., Mead, N.R.: Survivable Network Systems: An Emerging Discipline. Technical Report CMU/SEI-97-TR-013 ESC-97-013, Software Engineering Institute, Carnegie Mellon University, Pittsburg, PA 15213 USA (November 1997)