1. Procedures for Detecting Outlying Observations in Samples;FE Grubbs;Technometrics,1969
2. Portnoy L, Eskin E, Stolfo S. Intrusion Detection with Unlabeled Data Using Clustering. In: In Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001); 2001. p. 5–8.
3. Anomaly-based network intrusion detection: Techniques, systems and challenges;P Garcia-Teodoro;Computers and Security,2009
4. Host-Based Intrusion Detection Using Dynamic and Static Behavioral Models;DY Yeung;Pattern Recognition,2003
5. A Comprehensive Survey of Data Mining-based Fraud Detection Research;C Phua,2005