1. Abad, C., Taylor, J., Sengul, C., Yurcik, W., Zhou, Y., & Rowe, K. (2003). Log correlation for intrusion detection: A proof of concept. In Proceedings of the 19th Annual Computer Security Applications Conference (pp. 255-264). Washington, DC: IEEE Computer Society.
2. A survey on intrusion detection in mobile ad hoc networks;T.Anantvalee;Wireless/Mobile Network Security,2006
3. Filtering Events using Clustering in Heterogeneous Security Logs
4. Aussibal, J., & Gallon, L. (2008). A new distributed IDS based on CVSS framework. In Proceedings of the 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems (pp. 701-707). Washington, DC: IEEE Computer Society.
5. The base-rate fallacy and the difficulty of intrusion detection