1. Computer security threat monitoring and surveillance;Anderson,1980
2. State transition analysis: A rule-based intrusion detection approach;Porras;IEEE Trans. on Software Engineering,1992
3. Fast kNN classifiers for network intrusion detection system;Brao;Indian J. Sci. Technol.,2017