1. Masud M. M, Khan L., and Thuraisingham B.: A scalable multi-level feature extraction technique to detect malicious executables. Springer Science+Business Media, LLC 2007, Inf Syst Front 10:33–45,
https://doi.org/10.1007/s10796-007-9054-3
, (2008).
2. Denning D. E.: An intrusion-detection model. IEEE Journal on Software Engineering. Special Issue on Computer Issues and Privacy, vol. 13, Issue 2, pp. 222–232, (1987).
3. Mazzariello C., Romano S. P., and Sansone C.: Evaluating pattern recognition techniques in Intrusion Detection Systems. Conference: Pattern Recognition in Information Systems, Proceedings of the 5th International Workshop on Pattern Recognition in Information Systems, PRIS 2005, In conjunction with ICEIS 2005, Miami, FL, USA, pp. 144–153, (2005).
4. Lunt T. F., Tamaru A., Gilham F., Jagannathan R, Jalali C., Neumann P. G. Javitz H. S., Valdes A., and Garvey T. D.: A real time Intrusion Detection Expert System (IDES). Tech. report, SRI International, Menlo Park, CA, (1992).
5. Javitz H. S., Valdez A., Lunt T., and Tyson M.: Next generation Intrusion Detection Expert System (NIDES). Tech. Report SRI Technical Report A016, SRI International, (1993).