1. Barry, B.I.A. ad Chan, H.A., Intrusion Detection Systems in Handbook of Information and Communication Security, Stavroulakis, P. and Stamp, M., Eds., Springer Berlin Heidelberg, 2010, pp. 193–205.
2. Tavallaee, M., Bagheri, E., Wei, L., and Ghorbani, A.A., A detailed analysis of the KDD CUP 99 data set, CISDA 2009. IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009, pp. 1–6.
3. KDD Cup. http://kddicsuciedu/databases/kddcup99/kddcup99html. Cited April 2, 2015.
4. Stolfo, S.J., Fan, W., Lee, W., Prodromidis, A., and Chan, P.K., Cost-based modeling for fraud and intrusion detection: Results from the JAM project, DISCEX'00. Proceedings of DARPA Information Survivability Conference and Exposition, 2000, pp. 130–144.
5. Lippmann, R.P., Fried, D.J., Graf, I., Haines, J.W., Kendall, K.R., Mcclung, D., et al., Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation DISCEX'00. Proceedings DARPA Information Survivability Conference and Exposition, 2000, pp. 12–26.