1. Sequeira, D.: Intrusion Prevention Systems-Security’s Silver Bullet? SANS Institute InfoSec Reading Room (2002). Available at:
http://www.sans.org/reading_room/whitepapers/detection/intrusionprevention_systes_securitys_bullet_366?show = 366.php\&cat = detection
2. Ludwig, S., Bauer, K.: Immune network algorithm applied to the optimization of composite SaaS in cloud computing. In: IEEE Congress on Evolutionary Computation, Sendai, Japan, pp. 3042–3048, May 2015
3. Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in Cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)
4. Anderson, J.: Computer Security Threat Monitoring and Surveillance, Technical report. Available at:
http://csrc.nist.gov/publications/history/ande80.pdf
5. Denning, D.: An intrusion detection model. IEEE Trans. Software Eng. 13(2), 222–232 (1987)