1. Warrender, C., Forrest, S., and Pearlmutter, B., Detecting Intrusions Using System-Calls: Alternative Data Models, IEEE Symposium on Security and Privacy, 1999.
2. Jha, S., Tan, K., and Maxion, R.A., Markov chains, classifiers, and intrusion detection, Proceedings of the 14th IEEE workshop on Computer Security Foundations, 2001.
3. Eskin, E., Lee, W., and Stolfo, S.J., Modeling system calls for intrusion detection with dynamic window sizes, DARPA Information Survivability Conference and Exposition, 2001.
4. Lee, W. and Xiang, D., Information-Theoretic Measures for Anomaly Detection, 2001.
5. Kort, S.S., Theoretical Bases of Protection of Information, Saint-Petersburg: Helios, 2004.